Notes to Pages 130 –33 289 11. Norman N. Holland, The Internet Regression, in T P C (John Suler ed., 1996), available at http://www.rider.edu/~suler/psycyber/holland .html. 12. See, e.g., Lawrence B. Solum & Minn Chung, The Layers Principle: Internet Architecture and the Law, 79 N D L. R. 815 (2004); Kevin Werbach, A Layered Model for Internet Policy, 1 J. T. H T. L. 37 (2002); Richard S. Whitt, A Hori- zontal Leap Forward: Formulating a New Public Policy Framework Based on the Network Layers Model, 56 F. C. L.J. 587 (2004); see also A K, I G- : A P 13, 17–19 (2005), available at http://www.apdip.net/publications /iespprimers/eprimer-igov.pdf (discussing the different layers and how their existence should affect Internet governance). 13. See Alexa, Global Top 500, http://www.alexa.com/site/ds/top_sites?ts_modeϭ global&langϭnone (last visited June 1, 2007). While the sites’ rankings tend to fluctu- ate, Wikipedia is consistently listed within the top 10. 14. For examples of attempts to create this library, see Internet Archive, Bibliotheca Alexandrina, http://www.archive.org/about/bibalex_p_r.php (last visited June 1, 2007); Alexandria Digital Library, http://www.alexandria.ucsb.edu/ (last visited June 1, 2007); Posting of Ionut Alex Chitu to Google Operating System, Google’s Digital Library of Alexandria, http://googlesystem.blogspot.com/2006/08/googles-digital-library-of- alexandria.html (Aug. 13, 2006). 15. Wikipedia, Encyclopaedia Britannica, http://en.wikipedia.org/wiki/Encyclop%C3% A6dia_Britannica (as of June 1, 2007, 10:00 GMT). 16. Id. 17. The History Place, The Rise of Adolf Hitler, http://www.historyplace.com/worldwar2/ riseofhitler/ (last visited June 1, 2007). 18. Cats That Look Like Hitler!, http://www.catsthatlooklikehitler.com/ (last visited June 1, 2007) (using the term “kitlers” to describe cats that look like Hitler). 19. Wikipedia founder Jimmy Wales underscores that Bomis, his dot-com search engine business, was not directly involved in pornography, pointing out that its content was R-rated rather than X-rated, like Maxim magazine rather than Playboy. This came to light when Wired reported that he had edited his own Wikipedia entry to make it more precise on the matter. See Evan Hansen, Wikipedia Founder Edits Own Bio, W, Dec. 19, 2005, http://www.wired.com/news/culture/0,1284,69880,00.html. 20. GNE Is Not an Encyclopedia, GNE Help-Moderators, http://gne.sourceforge.net/eng/ help/moderators.htm (last visited Mar. 9, 2007). 21. GNE Is Not an Encyclopedia, The GNE FAQ, http://gne.sourceforge.net/eng/faq.htm (last visited June 1, 2007). 22. Wikipedia, Bomis, http://en.wikipedia.org/wiki/Bomis (as of Apr. 11, 2007, 14:16 GMT). 23. Stacy Schiff, Know It All: Can Wikipedia Conquer Expertise?, N Y (July 21, 2006), available at http://www.newyorker.com/archive/2006/07/31/060731fa_fact. 24. Wikipedia, Nupedia, http://en.wikipedia.org/wiki/Nupedia (as of Apr. 30, 2007, 18:01 GMT).
290 Notes to Pages 133–37 25. Id. 26. Nupedia, The Free Encyclopedia, http://nupedia.8media.org (last visited June 1, 2007). 27. Posting of Timothy to Slashdot, The Early History of Nupedia and Wikipedia: A Memoir, http://features.slashdot.org/features/05/04/18/164213.shtml (Apr. 18, 2005, up- dated Apr. 20, 2005 19:19 GMT). 28. Also known as the “robustness principle.” See I. S. I., U. S. C., T- C P: DARPA I P P S (Jon Postel ed., Sept. 1981), available at http://rfc.sunsite.dk/rfc/rfc793.html. 29. See Wikipedia Meta-Wiki, Wikipedia, http://meta.wikimedia.org/wiki/Wikipedia (as of June 1, 2007, 08:15 GMT). 30. Wikipedia Meta-Wiki, Three-Revert Rule, http://en.wikipedia.org/wiki/Wikipedia: Three-revert_rule (as of June 1, 2007, 08:15 GMT). 31. Wikipedia policy prohibits “wheel wars”—cases in which a Wikipedia administrator re- peatedly undoes the action of another—just as it prohibits edit wars. See Wikipedia, Wheel War, http://en.wikipedia.org/wiki/Wikipedia:Wheel_war (as of May 30, 2007 at 21:40 GMT). A meta-meta-rule is that while administrators do not second-guess each others’ actions without good reason, some restrictions require persistent consensus among admins—nearly any admin may unprotect a page or remove a block. 32. See Wikipedia, Wikipedia: No Legal Threats, http://en.wikipedia.org/wiki/Wikipedia: No_legal_threats (as of May 30, 2007 at 21:41 GMT). 33. E.g., Wikipedia Meta-Wiki, Editing with Tor, http://meta.wikimedia.org/wiki/Tor (as of June 1, 2007, 08:15 GMT) (“English Wikipedia tends to block every Tor node.”). 34. Wikipedia, Barnstar, http://en.wikipedia.org/wiki/Barnstar (as of June 1, 2007, 08:20 GMT). 35. There are many different Wikipedia barnstars that connote different things. For exam- ple, General Barnstars are awarded to describe “contributions or editing along a specific theme.” The Barnstar of High Culture, Epic Barnstar, and Ancient Ruin History Barn- star are examples of barnstars awarded “in recognition of excellent contributions” that are within one of seven major categories listed on the Main Page. Wikimedia Commons, Barnstar, http://commons.wikimedia.org/wiki/Barnstar (as of June 1, 2007, 08:30 GMT) (describing different barnstars awarded to Wikipedia contributors). 36. Wikipedia, English Wikipedia, http://en.wikipedia.org/wiki/English_Wikipedia (as of June 1, 2007, 08:25 GMT). 37. See Eric S. Raymond, Release Early, Release Often, in T C B: M L O S A R (2001), available at http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/ ar01s04.html. 38. See supra note 2. 39. Jim Giles, Internet Encyclopaedias Go Head to Head, N N, Dec. 14, 2005, http://www.nature.com/news/2005/051212/full/438900a.html (last updated Mar. 28, 2006). 40. Except for those younger users that shun it for more instantaneous forms of messaging.
Notes to Pages 137 –40 291 See Nate Anderson, Teens: E-mail Is for Old People, A T, Oct. 2, 2006, http://arstechnica.com/news.ars/post/20061002-7877.html. 41. Gregg Keizer, Spam Sets Record, Accounts for 94 Percent of E-mail, IT N, Jan. 11, 2007, http://www.itnews.com.au/newsstory.aspx?CIaNIDϭ44188. 42. See supra Ch. 3. 43. See Wikipedia, Wikipedia: Counter-Vandalism Unit, http://en.wikipedia.org/wiki/ Wikipedia:Counter-Vandalism_Unit (as of May 30, 2007, at 17:40 GMT); Wikipedia, Wikipedia: Barnstars, http://en.wikipedia.org/wiki/Wikipedia:Barnstars (as of Sep. 30, 2007, 00:18 GMT) (“The Defender of the Wiki may be awarded to those who have gone above and beyond to prevent Wikipedia from being used for fraudulent purposes. It was created after the 2004 Indian Ocean earthquake, when a fraudulent charity tried to take advantage of the widespread media coverage of the article.”). 44. See, e.g., Wikipedia, User:MartinBot, http://en.wikipedia.org/wiki/User:MartinBot (as of May 30, 2007, 17:41 GMT). 45. The actual Wikipedia entry stated: “For a brief time, [Seigenthaler] was thought to have been directly involved in the Kennedy assassinations of both John, and his brother, Bobby. Nothing was ever proven.” John Seigenthaler, A False Wikipedia ‘Biography,’ USA T, Nov. 29, 2005, available at http://www.usatoday.com/news/opinion/editorials /2005-11-29-wikipedia-edit_x.htm. 46. Wikipedia, Seigenthaler Controversy, http://en.wikipedia.org/wiki/John_Seigenthaler _Sr._Wikipedia_biography_controversy (as of June 1, 2007, 09:00 GMT). 47. Wikipedia, Deletion Log, http://en.wikipedia.org/w/index.php?titleϭSpecial%3ALog &typeϭdelete&userϭEssjay&pageϭJohnϩSeigenthalerϩSr (as of June 1, 2007, 09:00 GMT) (allowing user to look at deletions for a given Wikipedia page). 48. See 47 U.S.C. § 230 (c)(1) (2000); Seigenthaler, supra note 45. 49. 47 U.S.C. § 230 (c)(1) (2000); see also Ken S. Myers, Wikimmunity: Fitting the Commu- nications Decency Act to Wikipedia, 20 H. J.L. T. 163 (2006) (concluding that Wikipedia would be immune under CDA § 230 provisions). There is an unexplored doctrinal issue with CDA § 230: Wikipedia’s unusual structure makes it difficult to as- certain whether a Wikipedia editor should be deemed an agent of Wikipedia for liability purposes, just as a reporter for an online newspaper, as the newspaper’s agent, can make statements that give rise to liability for the paper, CDA § 230 notwithstanding. 50. Michael Snow, Article Creation Restricted to Logged-in Editors (Dec. 5, 2005), http:// en.wikipedia.org / wiki / Wikipedia:Wikipedia_Signpost / 2005-12-05 / Page_creation _restrictions. 51. See supra note 19. 52. Wikipedia, Congressional Staffer Edits to Wikipedia, http://en.wikipedia.org/wiki/Con gressional_staffer_edits_to_Wikipedia (as of June 1, 2007, 09:00 GMT). 53. Time on Wikipedia Was Wasted, L S, Jan. 28, 2006. 54. See generally J S, T W C (2004). 55. Centiare, Directory: MyWikiBiz, http://www.centiare.com/Directory:MyWikiBiz (as of June 1, 2007, 09:05 GMT). 56. Id.
292 Notes to Pages 140–42 57. Wikipedia, User Talk:MyWikiBiz, http://en.wikipedia.org/wiki/User_talk:MyWikiBiz /Archive_1 (as of June 1, 2007, 09:05 GMT). 58. E-mail from Jimmy Wales, founder, Wikipedia, to WikiEN-1 mailing list, about My WikiBiz (Aug. 9, 2006, 02:58 PM), http://www.nabble.com/MyWikiBiz-tf2080660 .html. 59. Wikipedia, User:Essjay/RFC, http://en.wikipedia.org/wiki/User:Essjay/RFC (as of June 1, 2007, 09:00 GMT). 60. See Noam Cohen, After False Claim, Wikipedia to Check Degrees, N.Y. T, Mar. 12, 2007, at C8, available at http://www.nytimes.com/2007/03/12/technology/12wiki.html. 61. Wikipedia, User_talk:Essjay, http://en.wikipedia.org/wiki/User_talk:Essjay (as of Apr. 18, 2007, 18:11 GMT). 62. See, e.g., Wikipedia, Wikipedia: Requests for Arbitration/Pedophilia Userbox Wheel War, http://en.wikipedia.org/wiki/Wikipedia: Requests_for_arbitration/Pedophilia_userbox _wheel_war#Jimbo_as_the_ultimate _authority (as of May 30, 2007, 21:58 GMT), in which Wikipedia editors and administrators warred over whether to permit a Wikipedia user to identify himself as a pedophile on his Wikipedia user page. Jimbo ultimately cut the debate short by removing the label and banning its return, and the Wikipedia arbi- tration committee recognized Jimbo’s powers, subject to review by the Wikimedia Foun- dation’s board of trustees, to pretermit what would otherwise be a decision handled through other processes. On the other hand, Jimbo’s creation of a new Wikipedia article for Mizoli’s Meats, a South African butcher shop, was deleted by a sysop twenty-two minutes later, deemed manifestly unworthy of inclusion. See David Sarno, Wikipedia Wars Erupt, L.A. T, Sept. 30, 2007, available at http://www.latimes.com/entertainment /news/newmedia/la-ca-webscout 30sep30,1,6497628.story. 63. See A. Michael Froomkin, [email protected]: Toward a Critical Theory of Cyber- space, 116 H. L. R. 749 (2003). 64. Jon Postel was the RFC editor for twenty-eight years, choosing which drafts of requests for comment to publish as IETF RFCs. RFC Editor et al., RFC 2555; 30 Years of RFCs (Apr. 7, 1999), http://www.ietf.org/rfc/rfc2555.txt. He was also the Internet Assigned Numbers Authority, a name given to the functions he performed in allocating blocks of IP addresses. See Jonathan Zittrain, ICANN: Between the Public and the Private, 14 B T. L.J. 1071 (1999); Todd Wallack & Ellen Messmer, Industry Asks: Who Is Jon Postel?, N W (Apr. 21, 1997), http://www.networkworld.com/ news/0421postel.html. 65. See R K B, C D R L (Jan. 2005), available at http://www.carnegieendowment.org/files/CP55.Belton.FINAL .pdf; see also D R L (Adam Przeworski & Jose Maria Mar- avall eds., 2003); A V D, I S L C 175 – 336 (5th ed. 1897); F A. H, T C- L 162–76 (1960); C M, M: T S L (Anne M. Cohler et al. eds., 1989); S R, L, R, L P (1998); Philip Selznick, American Society and the Rule of Law, 33 S J. I’ L. C. 29 (2005); Barry R. Weingast, The Politi-
Notes to Page 143 293 cal Foundations of Democracy and the Rule of Law, 91 A. P. S. R. 245 (1997); Anthony M. Kennedy, Assoc. Justice, U.S. Supreme Court, Speech at the American Bar Association Annual Meeting (Aug. 9, 2003)(revised Aug. 14, 2003), available at http:// www.supremecourtus.gov/publicinfo/speeches/sp_08–09–03.html; Wikipedia, Rule of Law, http://en.wikipedia.org/wiki/Rule_of_law (as of June 1, 2007, 08:30 GMT). 66. Wiki Truth, Jimbo Found Out, http://www.wikitruth.info/index.php?titleϭJimbo_ Found_Out (last visited June 1, 2007). 67. Wikipedia, Articles for Deletion/Angela Beesley, http://en.wikipedia.org/wiki/Wikipedia: Articles_for_deletion/Angela_Beesley (as of Jan 6. 2007, 19:17 GMT). 68. Wikipedia, Articles for Deletion/Angela Beesley (3rd nomination), http://en.wikipedia .org/wiki/Wikipedia:Articles_for_deletion/Angela_Beesley_(3rd_nomination) (as of May 3, 2007, 16:46 GMT). 69. 17 U.S.C. § 512 (2000); see also Wikipedia, Online Copyright Infringement Liability Limitation Act, http://en.wikipedia.org/wiki/Online_Copyright_Infringement_Liability _Limitation_Act (providing a summary of the § 512 provisions of the DMCA) (as of June 1, 2007, 09:00 GMT); supra Ch. 5, note 83 and accompanying text. 70. RU Sirius, Jimmy Wales Will Destroy Google, 10 Zen Monkeys (Jan. 29, 2007), http://www.10zenmonkeys.com/2007/01/29/wikipedia-jimmy-wales-rusirius-google- objectivism/. 71. Communitarianism is a social theory that rejects the devaluation of community. In as- serting that family, friends, and social groups are important to the good life, communi- tarians focus on three themes: the importance of social context and tradition for mean- ing-making, the self ’s social nature, and the community’s normative value. Each of these themes suggests the importance of allowing individuals to participate freely in various aspects of society and to shape the society in which they live. See Alasdair MacIntyre, Concept of a Tradition, in L C 125, 142 (“We all approach our own circumstances as bearers of a particular social identity. I am someone’s son or daugh- ter, someone else’s cousin or uncle; I am a citizen of this or that city, a member of this or that guild or profession; I belong to this claim, that tribe, this notion. Hence what is good for me has to be the good for one who inhabits these roles.”); Michael J. Sandel, Justice and the Good, in id., 159, 165 (Sandel ed., 1984) (“[I]n so far as our constitutive self-understandings comprehend a wider subject than the individual alone, whether a family or tribe or city or class or nation or people, to this extent they define a community in the constitutive sense. And what marks such a community is not merely a spirit of benevolence, or the prevalence of communitarian values, or even ‘shared final ends’ alone, but a common vocabulary of discourse and a background of implicit practices and understandings within which the opacity of the participants is reduced if never finally dissolved.”); M W, T T 27 (1984) (arguing that meaning is made with reference to particular social contexts that are “shared across a society, among a group of people with a common life”); see generally D B, C I C (1993); R N, T Q C (1953); Cass R. Sunstein, Beyond the Republican Revival, 97 Y L.J. 1539 (1988); Robert J. Condlin, Bargaining with a Hugger: The Weakness and Limitations of a Communitarian Conception
294 Notes to Pages 143–46 of Legal Dispute Bargaining, Or Why We Can’t All Just Get Along (Berkeley Press Legal Series, Working Paper No. 1194), available at http://works.bepress.com/cgi/viewcontent .cgi?articleϭ1000&contextϭrobert_condlin. 72. See Europa Glossary, Subsidiarity, http://europa.eu/scadplus/glossary/subsidiarity _en.htm (last visited June 1, 2007); Wikipedia, Subsidiarity, http://en.wikipedia.org/ wiki/Subsidiarity (as of June 1, 2007, 09:00 GMT). 73. See IDG News Serv., Chinese Censors Block Access to Wikipedia, ITW., June 14, 2004, http://www.itworld.com/Tech/2987/040614wikipedia/; Wikipedia, Blocking of Wikipedia in Mainland China, http://en.wikipedia.org/wiki/Blocking_of_Wikipedia _in_mainland_China (as of June 1, 2007, 08:45 GMT). 74. Not every version of Wikipedia has the same policies. The German Wikipedia recently instituted a test project to have concurrent versions of pages—stable and unstable—so that the edits would need to be approved by a Wikipedian of a certain stature before go- ing live. The plan was designed to address vandalism problems and allow edits to previ- ously protected pages. See Daniel Terdiman, Can German Engineering Fix Wikipedia, CNET N., Aug. 23, 2006, http://news.com.com/2100–1038_3–6108495 .html. 75. See supra note 1 and accompanying text. 76. Wikipedia is licensed under the GNU Free Documentation License. This license allows anyone to copy, redistribute, or modify the work for commercial or noncommercial purposes, as long as the author is properly attributed and that any resulting derivative works are also under the same license. See GNU Project, Free Documentation License, http://www.gnu.org/licenses/fdl.html (last visited June 1, 2007). The latter provision is often referred to as “copyleft.” Id. There is currently some debate surrounding the state of Wikipedia’s license. The GFDL is not currently compatible with the Creative Com- mons Attribution-Sharealike (BY-SA), a similar and more widely used license. There is interest in making Wikipedia available under the CC BY-SA or compatible license, which would make Wikipedia’s content better able to be incorporated into other works. Such a process would likely require an update by the creators of the GFDL (the Free Software Foundation) to allow for compatibility with the CC BY-SA license. 77. Wales may be reconsidering: “‘When we’re turning down millions and millions of dol- lars in advertising revenue that could be used, to for example, put computers in schools in Africa . . . we have to [be] very thoughtful and responsible about why we’re doing it,’ he said in an interview.” Wendell Roelf, Wikipedia Founder Mulls Revenue Options, R, Apr. 20, 2007, http://reuters.com/internetNews/idUSL1964587420070420. 78. Wikipedia, Mirrors and Forks/Abc, http://en.wikipedia.org/wiki/Wikipedia:Mirrors _and_forks/Abc (as of June 1, 2007, 09:10 GMT). 79. Wikipedia, Talk:Gracenote, http://en.wikipedia.org/wiki/Talk:Gracenote (as of June 1, 2007, 09:10 GMT). 80. Dove, Dove Cream Oil Body Wash (online broadcast), http://dovecreamoil.com/ (dis- playing results of Dove Cream Oil contest where users were asked to make their own commercials); Video: Angry Attack Ads Roll In, CNET N.C, Mar. 31, 2006. http://news.com.com/1606-2-6056633.html (showing a medley of user-submitted commercials criticizing the Chevy Tahoe).
Notes to Pages 146 –52 295 81. But see Louise Story, The High Price of Creating Free Ads, N.Y. T, May 26, 2007, at http://www.nytimes.com/2007/05/26/business/26content.html (explaining the down- sides of relying on user-generated content for advertising). 82. Rebecca Popuch, Yelp Elite Status, http://www.yelp.com/user_details_reviews_self ?useridϭ-4XnJXO0YQhcl7Dz2Yir_g&rec_pagestartϭ10&review_sortϭtime, Feb. 4, 2007. Popuch notes that Yelp does not permit users to delete their own profiles, so changes of heart cannot be promptly reflected by initiating a mass deletion of one’s con- tributions to the system. See infra Ch. 9 for further discussion of this policy. 83. See supra Ch. 4, note 72 and accompanying text. 84. See, e.g., Posting of Rebecca Mackinnon to RConversation, Google in China: Degrees of Evil, http://rconversation.blogs.com/rconversation/2006/01/google_in_china.html, (Jan. 25, 2006, 12:49); Press Release, Reporters Without Borders, Google Launches Censored Version of Its Search Engine ( Jan. 25, 2006), available at http://www.rsf.org/ article.php3?id_articleϭ16262; Amnesty Int’l, Amnesty International Launches Global Campaign Against Internet Repression, http://web.amnesty.org/library/Index/ENGACT 300162006 (last visited June 1, 2007); Curbing Corporate Complicity in Internet Fil- tering and Surveillance: Tech Firms Pursue Code of Conduct, Open Net Initiative (Feb. 1, 2007), http://www.opennetinitiative.net/blog/?pϭ137. 85. See S, supra note 54, at 15 –17, 72, 85. 86. Ilse Arendse, ‘MySpace Will Fail . . . ’, News24, Apr. 20, 2007, http://www.news24 .com/News24/Technology/News/0,,2-13-1443_2102112,00.html. 87. See Deciphering the Mystery of Bee Flight, PhysOrg.com, Nov. 30, 2005, http://www .physorg.com/news8616.html. PART III. SOLUTIONS 1. See, e.g., Placeopedia, http://www.placeopedia.com/ (last visited May 30, 2007) (link- ing Wikipedia articles to specific locations and showing them on a map) Soup Soup Aug- mented News, http://www.soup-soup.net/ (last visited May 30, 2007) (featuring news, links to Wikipedia articles that give background on the places in the news, and blogs and photos on similar topics in one place). 2. See Joyce K. Reynolds, RFC 1135: The Helminthiasis of the Internet (Dec. 1989), http://www.ietf.org/rfc/rfc1135.txt. 3. See John Borland, See Who’s Editing Wikipedia, W., Aug. 15, 2007, http:// www.wired.com/politics/onlinerights/news/2007/08/wiki_tracker (explaining the me- chanics of Wikiscanner); Posting of Kevin Poulsen to meat level, Vote on the Most Shame- ful Wikipedia Spin Jobs, W., http://blog.wired.com/27bstroke6/wikiwatch/ (Aug. 13, 2007, 23:03 GMT) (curating a user-contributed library of particularly no- table instances of organizational censorship on Wikipedia). 4. See generally James Surowiecki, T W C (2004). For a discussion of communitarian views of democratic citizenship and participatory meaning-making, see, for example, Michael Walzer, Response, in P, J, E 282 (David Miller & Michael Walzer eds., 1993). 5. Communitarians have championed citizens’ role in shaping their communities. See, e.g.,
296 Notes to Pages 155–57 M W, T T: M A H A (rev. ed. 2006); Michael J. Sandel, Justice and the Good, in L I C 159 (Michael Sandel ed., 1984). For more on communitarianism, see generally A C. MI, A V: A S M T (2d ed. 1984); M J. S, D’ D: A S P P (reprint ed. 1998); M W, S J: A D P E (reprint ed. 1984). CHAPTER 7. STOPPING THE FUTURE OF THE INTERNET 1. For a sketch of such a machine, see Butler Lampson, Microsoft, Powerpoint on Ac- countability and Freedom 17–18 (Sept. 26, 2005), http://research.microsoft.com/ lampson/slides/accountabilityAndFreedomAbstract.htm. 2. See Dan Griffin, Create Custom Login Experiences with Credential Providers for Windows Vista, MSDN M., Jan. 2007, http://msdn.microsoft.com/msdnmag/issues/07/01/ CredentialProviders/?topicsϭ/msdnmag/issues/07/01/CredentialProviders (detailing ways in which an organization can customize the Windows Vista logon screen and im- plement various authentication methods). 3. Some have suggested that the Internet ought to be zoned in a parallel fashion, thereby distinguishing it in an analogous fashion to the scenario involving Red and Green PCs. See Riva Richmond, Software to Spot ‘Phishers’ Irks Small Concerns, W S. J., Dec. 19, 2006, at B1, available at http://online.wsj.com/public/article/SB116649577602354 120-5U4Afb0JPeyiOy1H_j3fVTUmfG8_20071218.html (describing a feature in In- ternet Explorer 7 that turns the Internet address bar green when entering an e-commerce site that Microsoft has certified as legitimate); see also David S. Isenberg, The Internet Experiment Is Not Finished, V M., Mar. 2006, at 64, available at http://www .vonmag-digital.com/vonmag/200603/?pgϭ66 (suggesting that the red-green divide I outline in this book will be exploited by “control-freak incumbents” seeking to wall off generativity). 4. Cf. David Talbot, The Internet Is Broken—Part 2, T. R., Dec. 20, 2005, available at http://www.technologyreview.com/printer_friendly_article.aspx?idϭ16055 (describ- ing “middleman” technologies that authenticate Internet communications by receiving identification information from senders and routing certain attributes of this informa- tion on to recipients). 5. See, e.g., Granma’s Rules of POLA, http://www.skyhunter.com/marcs/granmaRules Pola.html (last visited June 1, 2007) (outlining six rules for desktop security based on the Principle of Least Authority); Sudhakar Govindavajhala & Andrew W. Appel, Windows Access Control Demystified 2 ( Jan. 31, 2006) (unpublished manuscript under submis- sion), available at http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf (detail- ing how the “fine-grained and expressive” character of Windows access control makes it difficult to evaluate the consequences of commercial access-control configurations, which leads to misconfigurations and “privilege-escalation vulnerabilities”); Introduc- tion to Capability Based Security, http://www.skyhunter.com/marcs/capabilityIntro/ index.html (last visited June 1, 2007).
Notes to Pages 157 –62 297 6. See Wikipedia Qatar Ban ‘Temporary,’ BBC N, Jan. 2, 2007, http://news.bbc.co.uk/ 1/hi/technology/6224677.stm; see also Wikipedia User Page, User talk:82.148.97.69, http://en.wikipedia.org/wiki/User_talk:82.148.97.69 (as of Mar. 23, 2007, 00:10 GMT) (explaining, on the user talk page of an IP address used by many people in Qatar, why the IP address was blocked). 7. See Web Users to ‘Patrol’ US Border, BBC N, June 2, 2006, http://news.bbc.co.uk/1/ hi/world/americas/5040372.stm. 8. I am a principal investigator of StopBadware. 9. This distributed approach to resolving generative social problems has begun to see greater use and experimentation. One example is the U.S. Department of Homeland Security’s proposed Cell-All program, which would outfit cell phones with sensors for biological and chemical weapons and report “hits” to a central database. See Mimi Hall, Phones Studied as Attack Detector, USA T, May 3, 2007, http://www.usa today.com / tech / news / techpolicy / 2007-05-03-cellphone-attack-detector_ N.htm?cspϭ34. 10. See L. Jean Camp & Allan Friedman, Good Neighbors Can Make Good Fences: A Peer- to-Peer User Security System (Sept. 24, 2005) (conference paper, presented at Research Conference on Comm’cn, Info. and Internet Pol’y), http://web.si.umich.edu/tprc/ papers /2005/453/tprc_GoodNeighbors.pdf. 11. See Y B, T W N 285 – 87 (2006). 12. Cf. Alasdair MacIntyre, Seven Traits for the Future, 9 H C. R. 5, 6–7 (1979) (discussing the importance of “cooperative and rational” planning, celebrating “non- manipulative relationships,” and describing the ideal society as one in which citizens do not “fence around unpredictability wherever it is to be found”). 13. When done well, community initiatives can serve to mitigate the less egalitarian out- comes which the move toward private policing has caused. See, e.g., Clifford Shearing & Jennifer Wood, Governing Security for Common Goods, 31 I. J. S. L. 205 (2003). However, there are criticisms of such community initiatives. In this view, there need to be structures in place to protect minority views within the communities, otherwise their rights can be trampled. 14. John Perry Barlow, A Declaration of Independence of Cyberspace (Feb. 8, 1996), http:// homes.eff.org/~barlow/Declaration-Final.html. 15. See, e.g., Kevin R. Pinkney, Putting Blame Where Blame Is Due: Software Manufacturer and Customer Liability for Security-Related Software Failure, 13 A. L.J. S. T. 43, 46 (2002) (arguing that software makers should be liable for exploited security vul- nerabilities). 16. In the American legal system, the main reason for this is because the harm from bad soft- ware is usually only economic, and liability for a defective product requires some form of physical harm arising from the defect. See R T. N, T L C- T § 10:32 (3d ed. 2006). 17. That might be the only remedy owed the consumer, rather than, for example, emotional damages from missing one’s favorite shows. This arises from the difference between dam- ages in contract and tort. See generally W. P K, P K L T 962 (1984).
298 Notes to Pages 162–68 18. See Wikipedia, Blue Screen of Death, http://en.wikipedia.org/wiki/Blue_screen_of_ death (as of June 1, 2007, 09:30 GMT). 19. See supra Ch. 5, at 119. 20. See Jonathan Zittrain, A History of Online Gatekeeping, 19 H. J.L. T. 253 (2006). 21. See David P. Reed et al., Active Networking and End-to-End Arguments, IEEE N, May/June 1998, at 69 –71, available at http://web.mit.edu/Saltzer/www/publications/ endtoend/ANe2ecomment.html. 22. See Marjory S. Blumenthal, End-to-End and Subsequent Paradigms, 2002 L. R. M.S.U.-D.C.L. 709, 717 (2002) (remarking that end-to-end arguments “interact with economics, public policy, and advocacy dynamically to shape access to communication and information and to influence innovation”). 23. See infra Ch. 8, note 8. 24. See Jonathan Zittrain, The Generative Internet, 119 H. L. R. 1974, 1988–89 (2006). 25. See Saul Hansell, Spam Fighters Turn to Identifying Legitimate E-Mail, N.Y. T, Oct. 6, 2003, at C1 (discussing authentication and other possible solutions for limiting spam); Yakov Shafranovich, 2004: The Year That Promised Email Authentication, C- ID, Dec. 27, 2004, http://www.circleid.com/posts/2004_the_year_that_promised_ email_authentication (discussing various e-mail authentication proposals to limit spam on the receiving end); see also Saul Hansell, 4 Rivals Near Agreement on Ways to Fight Spam, N.Y. T, June 23, 2004, at C1 (discussing approaches toward authentication proposed by major ISPs). 26. See, e.g., J U, I S P: T L M’ F- (2003), http://www.sans.org/reading_room/special/index.php?id=isp_blocking (providing a case study of traffic filtering by ISPs). 27. See John Markoff, Attack of the Zombie Computers Is a Growing Threat, Experts Say, N.Y. T, Jan. 7, 2007, § 1, at 1. 28. See Ryan Naraine, Microsoft Says Recovery from Malware Becoming Impossible, W ., Apr. 4, 2006, http://www.eweek.com/article2/0,1895,1945808,00.asp. 29. See, e.g., StopBadware.org Identifies Companies Hosting Large Numbers of Websites That Can Infect Internet Users with Badware, StopBadware.org, May 3, 2007, http:// stopbadware.org/home/pr_050307 (discussing the top five hosting providers in their clearinghouse and pointing out that while providers were often quick to help Web site owners clean the code, they were unprepared to answer customers’ questions about vul- nerabilities that permitted hacks in the first place). 30. See Reinier H. Kraakman, Gatekeepers: The Anatomy of a Third-Party Enforcement Strat- egy, 2 J.L. E. O. 61 (1986) (identifying four criteria for the appropriateness of legal intervention: “(1) serious misconduct that practicable penalties cannot deter; (2) missing or inadequate private gatekeeping incentives; (3) gatekeepers who can and will prevent misconduct reliably, regardless of the preferences and market alternatives of wrongdoers; and (4) gatekeepers whom legal rules can induce to detect misconduct at reasonable cost”).
Notes to Pages 169 –71 299 31. Paul Festa, Hotmail Uses Controversial Filter to Fight Spam, CNET N., Nov. 9, 1999, http://news.com.com/Hotmailϩusesϩcontroversialϩfilterϩtoϩfightϩspam/ 2100-1040_3-232706.html. 32. Id. (“MAPS has used the RBL primarily to pressure server administrators to mend their policies, according to supporters. ‘The RBL is an educational tool for applying pressure more than a technical tool,’ said John Mozena, vice president of CAUCE, which has ties to both Hotmail and MAPS. ‘The wider implementation it has, the more important it becomes, because that increases the number of people your users can’t reach if you’re not playing well with others.’”). 33. See Kieren McCarthy, Anti-Spammers Turn Guns on Each Other, T R, July 19, 2000, http://www.theregister.co.uk/2000/07/19/antispammers_turn_guns_on_each/. 34. See Class Notes from Matt Anestis, Internet & Society 1999, Class 10: Barbed Wire on the Electronic Frontier: Private Armies & Their Private Weapons, available at http:// cyber.law.harvard.edu/is99/scribes10.html. 35. See Kiri Blakeley, Spam Warfare, F, Sept. 18, 2000, at 230. 36. See Laura Frieder & Jonathan Zittrain, Spam Works: Evidence from Stock Touts, 2007, Berkman Center Research Publication No. 2006-11, available at http://ssrn.com/abstract ϭ920553. 37. The same problem arises when states attempt to compel Internet Service Providers to block faraway content such as child abuse images. The blocks are usually permanently implemented using tools developed in the fight against hackers, and they block IP ad- dresses that can later belong to an entirely innocent party. See Jonathan Zittrain, Internet Points of Control., 44 B.C. L. R. 653 (2003). 38. See supra Ch. 3, & text accompanying note 101. 39. For example, one iframe exploit was: [iframe srcϭ”http://isecurepages.net/out.php?s _idϭ11” widthϭ0 heightϭ0] [/iframe]. 40. See Stopbadware.org, Frequently Asked Questions, Questions About Websites That Are the Subject of Google Warnings, http://www.stopbadware.org/home/faq#partner- warnings-search. 41. Per Chapter 3: Google and StopBadware.org, which collaborate on tracking and elimi- nating Web server exploits, report hundredfold increases in exploits between August of 2006 and March of 2007. In February of 2007 alone, Google reported that 11,125 servers believed to be infected. 42. By visiting a site like www.webtong.com, which searches WHOIS records lodged by do- main name registrants, and typing in a domain name, one can find the contact infor- mation a domain owner provided. For example, a search for google.com provided the e-mail address “[email protected].” See Search Domain Name Data, http:// www.webtong.com/services/domain/whois.html (last visited May 11, 2007). 43. In an e-mail, the Web site owner stated, “I believe the problem that brought this issue up was on . . . [a] bulletin board that was in .php. . . . We turned off the bulletin board. Someone had hacked us and then installed something that ran an ‘Active X’ something or rather. It would be caught with any standard security software like McAfee. What is unfortunate is that the bulletin board is rarely used at all, no one uses it actually. So we
300 Notes to Pages 172–77 turned it off and killed the links from our website and saved the database of posts for the future. It was fixed within 20 minutes of noticing the Search Engine link re-direct.” E-mail from Web site owner to StopBadware ( Jan. 14, 2007) (on file with the author). 44. A snapshot of the dialog box can be found at Steps for Installing Microsoft AntiSpyware, http://support.moonpoint.com/security/spyware/MS-Antispyware/ms-antispyware- install.html (last visited Nov. 23, 2007). 45. See, e.g., S P, M: T H N I R- (2007). 46. See Marsh v. Ala., 326 U.S. 501 (1946). 47. See, e.g., Molly Shaffer Van Houweling, Sidewalks, Sewers, and State Action in Cyberspace, http: / / cyber.law.harvard.edu / is02 / readings / stateaction-shaffer-van-houweling.html (last visited Nov. 18, 2007). 48. See FIND, http://www.nets-find.net (last visited Nov, 23, 2007). CHAPTER 8. STRATEGIES FOR A GENERATIVE FUTURE 1. Microsoft is widely reported to have employed this strategy with the Xbox 360. At the time of its release, it was estimated that its total cost was $715, including parts, assembly, et cetera. BusinessWeek calculated that Microsoft was losing up to $126 per unit. See Arik Hesseldahl, Microsoft’s Red-Ink Game, BW, Nov. 22, 2005, http://businessweek .com/technology/content/nov2005/tc20051122_410710.htm. 2. For opposing sides of this debate, compare Paul A. David, Clio and the Economics of QW- ERTY, 75 A. E. R. 332 (1985), with Stan J. Liebowitz & Stephen E. Margolis, Should Technology Choice Be a Concern of Antitrust Policy?, 9 H. J. L. T. 283 (1996) (arguing that it is difficult for “inappropriate” technology to become established as a standard and that antitrust policy should not be used to improve on even imperfect results). See also Seth Schoen, Trusted Computing: Promise and Risk, http://www .eff.org/Infrastructure/trusted_computing/20031001_tc.php (last visited May 15, 2007). 3. See 15 U.S.C.A. §§ 41– 58 (West Supp. 2006); FTC, Enforcing Privacy Promises: Sec- tion 5 of the FTC Act, http://www.ftc.gov/privacy/privacyinitiatives/promises.html (last visited May 15, 2007). 4. For example, a spreadsheet created in Microsoft Excel can be exported to the common .csv format and imported into another program. A photo file can be saved in Adobe Pho- toshop in the .jpg format and opened in any other photo editing program. Software such as VmpegX can translate video files from one format, such as .avi, to another, such as .mov. See About FfmpegX, http://Vmpegx.com/index.html (last visited May 15, 2007). 5. One might imagine the law providing the same strong protections for data portability against the changing interests of service providers as is given in private contracts against interference from shifting political circumstances. See Fletcher v. Peck, 10 U.S. 87 (1810) (affirming the validity of contract even in the wake of popular legislative attempts to revoke land claims); Dartmouth College v. Woodward, 17 U.S. 518 (1819) (protect- ing the pre–Revolutionary War charter of Dartmouth College against the state’s attempt to invalidate it).
Notes to Page 178 301 6. Wikipedia’s content is licensed under the GNU Free Documentation License, which al- lows licensees to copy, modify, and distribute the content as long as they release the mod- ified version under the same license. See Wikipedia, Wikipedia:Copyrights, http://en .wikipedia.org/wiki/Wikipedia:Copyrights (as of May 15, 2007, 05:15 GMT); GNU Free Documentation License, http://www.gnu.org/licenses/fdl.html (last visited May 15, 2007). 7. In June 2006, the popular site couchsurfing.com experienced a massive data failure, from which the founder believed the site could not recover. He issued a statement to his community saying goodbye. See Posting of Michael Arrington to TechCrunch, Couch- Surfing Deletes Itself, Shuts Down, http://www.techcrunch.com/2006/06/29/couch surfing-deletes-itself-shuts-down (June 29, 2006). Several days later, after much cajoling from Arrington’s community, the CouchSurfing site was back up, although some data had been permanently lost. In December 2006 some Gmail users logged on to find their inboxes empty and all their contacts deleted. That data was not recoverable. See Hari K. Gottipati, GMail Disaster, Google Confirmed the Mass Email Deletions. Even Backups Are Gone?, O’R XM, Dec. 28, 2006, http://www.oreillynet.com/xml/blog/2006/12/ gmail_disaster_google_confirme.html. Outages at the domain registration site Register- Fly caused that site to be taken down indefinitely. See Posting of Rich Miller to Netcraft, RegisterFly Site Goes Offline, http://news.netcraft.com/archives/2007/03/06/registerfly _site_goes_offline.html (Mar. 6, 2007, 20:07 GMT) (reporting RegisterFly’s outages and subsequent shutdown, and ICANN’s fears about the status of the domain names registered with RegisterFly). 8. For an overview of different perspectives on the debate, see, for example, “Network Neu- trality”: Hearing Before the S. Comm. on Commerce, Sci. & Transp., 109th Cong. (2006) (statement of Lawrence Lessig, Professor of Law, Stanford Law School), available at http://commerce.senate.gov/pdf/lessig-020706.pdf; Tim Wu, Network Neutrality FAQ, http://timwu.org/network_neutrality.html (last visited May 15, 2007); Christo- pher S. Yoo, Would Mandating Broadband Network Neutrality Help or Hurt Competition? A Comment on the End-to-End Debate, 3 J. T. H T. L. 71 (2004); David Farber & Michael Katz, Hold Off on Net Neutrality, W. P, Jan. 19, 2007, at A19. For a more detailed discussion of the network neutrality debate, compare Tim Wu, Network Neutrality, Broadband Discrimination, 2 J. T. H T. L. 141 (2003), and Mark A. Lemley & Lawrence Lessig, The End of End-to-End: Preserving the Architecture of the Internet in the Broadband Era, 48 UCLA L. R. 925 (2001), with Christopher S. Yoo, Beyond Network Neutrality, 19 H. J.L. T. 1 (2005). See also Legal Affairs Debate Club—Keeping the Internet Neutral? Christopher S. Yoo and Tim Wu Debate, L A, May 1, 2006, http://www.legalaffairs.org/webexclusive/ dc_printerfriendly.msp?idϭ86. For articles noting the centrality of end-to-end, see for example, Marjory S. Blumenthal, End-to-End and Subsequent Paradigms, 2002 L. R. M.S.U.-D.C. L. 709 (describing end-to-end as the current paradigm for understanding the Internet); and Lawrence Lessig, The Architecture of Innovation, 51 D L.J. 1783 (2002) (arguing that end-to-end establishes the Internet as a commons). For the per- spective of a number of economists, see William J. Baumol et al., Economists’ Statement on Network Neutrality Policy (AEI-Brookings Joint Ctr., Working Paper No. RP07–08,
302 Notes to Pages 178–79 2007). For an argument about why competition alone does not preclude network dis- crimination, see Brett M. Frischmann & Barbara van Schewick, Network Neutrality and the Economics of an Information Superhighway: A Reply to Professor Yoo, 47 J (forthcoming 2007) (manuscript at 7–8), available at http://papers.ssrn.com/ abstractϭ1014691. See also Jonathan L. Zittrain, The Generative Internet, 119 H. L. R. 1974, 1988 – 89, 2029 – 30 & n.208 (2006). 9. See Written Ex Parte of Professor Mark A. Lemley & Professor Lawrence Lessig, In re Application for Consent to the Transfer of Control of Licenses MediaOne Group, Inc. to AT&T Corp., No. 99 –251 (F.C.C. 1999), available at http://cyber.law.harvard.edu/ works/ lessig/cable/fcc/fcc.html; Joseph Farell, Open Access Arguments: Why Confidence Is Misplaced, in N N N N: S B I S B R 195 (Thomas M. Lenard & Randolph J. May eds., 2006); Barbara van Schewick, Towards an Economic Framework for Network Neutrality Regula- tion, 5 J. T. H T. L. 329, 368 –77 (2007) (noting the existence of switching costs and other factors). 10. Skype has petitioned the U.S. Federal Communications Commission to require mobile phone network providers to allow the use of Skype—and any other application chosen by the user—over their networks. Petition to Confirm a Consumer’s Right to Use In- ternet Communications Software and Attach Devices to Wireless Networks, in the Matter of Skype Communications, FCC Petition RM-11361 (2007), available at http: / / svartifoss2.fcc.gov / prod / ecfs / retrieve.cgi?native_or_pdfϭpdf&id_document ϭ6518909730. 11. See Robert E. Kahn, The Role of Government in the Evolution of the Internet, 37 C. ACM 15 (1994); Barry M. Leiner et al., The Past and Future History of the Internet, 40 C. ACM 102 (1997); Andrew Orlowski, Father of Internet Warns Against Net Neu- trality, R, Jan. 18, 2007, available at http://www.theregister.com/2007/01/18/ kahn_net_neutrality_warning; Video: An Evening with Robert Kahn, http://archive .computerhistory.org/lectures/an_evening_with_robert_kahn.lecture.2007.01.09.wmv (last visited Nov. 30, 2007); see also David Farber & Michael Katz, Editorial, Hold Off on Net Neutrality, W. P, Jan. 19, 2007, at A19; Adam D. Thierer, “Net Neutrality”: Digital Discrimination or Regulatory Gamesmanship in Cyberspace?, at 17–19 (CATO Policy Analysis No. 507, 2004), http://www.cato.org/pubs/pas/pa507.pdf; Robert Pepper, Network Neutrality: Avoiding a Net Loss, TNW, Mar. 14, 2007, available at http://www.technewsworld.com/story/Ii1IJ10PgRjmkt/Network-Neu- trality-Avoiding-a-Net-Loss.xhtml; Christopher Yoo, Beyond Network Neutrality, 19 H. J.L. & T. 1 (2005), available at http://jolt.law.harvard.edu/articles/pdf/ v19/19HarvJLTech001.pdf. 12. See Declan McCullagh, FAQ: Wi-Fi Mooching and the Law, C N., July 8, 2005, http://news.com.com/FAQϩWi-Fiϩmoochingϩandϩtheϩlaw/2100-7351_3- 5778822.html; Paul Festa, Free Wireless Net Access for the Masses, C N., Sept. 26, 2001, http://news.com.com/FreeϩwirelessϩNetϩaccessϩforϩtheϩmasses/ 2100-1033_3-273516.html; EFF Wireless-Friendly ISP List, http://www.eff.org/ Infrastructure/Wireless_cellular_radio/wireless_friendly_isp_list.html (last visited May 15, 2007).
Notes to Pages 179 –81 303 13. One such product is the Nessus Vulnerability Scanner. See Nessus, Nessus Vulnerability Scanner, http://www.nessus.org (last visited May 15, 2007). 14. See Rajiv Shah & Christian Sandvig, Software Defaults as De Facto Regulation: The Case of Wireless APs 9 (Sept. 23, 2005), (unpublished manuscript, presented to Conference on Comm. Info. and Internet Pol’y), available at http://web.si.umich.edu/tprc/papers/ 2005/427/TPRC%20Wireless%20Defaults.pdf. 15. See John Markoff, Venture for Sharing Wi-Fi Draws Big-Name Backers, N.Y. T, Feb. 6, 2006, at C3; What’s FON?, http://www.fon.com/en/info/whatsFon (last visited May 15, 2007). 16. See, e.g., Verizon Online, Terms of Service, http://www.verizon.net/policies/vzcom/ tos_popup.asp (last visited May 15, 2007). 17. See, e.g., Wireless Service Theft Prevention Law, 720 I. C. S. A. §§ 5/16F-1 to -6 (West 2006); S.B. 1646, 92 Gen. Assembly, (Ill. 2003), available at http:// www.ilga.gov/legislation/publicacts/pubact92/acts/92-0728.html; Man Arrested for Stealing Wi-Fi, CBS N, Apr. 4, 2007, http://www.cbsnews.com/stories/2005/07/ 07/tech/main707361.shtml; Jane Wakefield, Wireless Hijacking Under Scrutiny, BBC N, July 28, 2005, http://news.bbc.co.uk/2/hi/technology/4721723.stm. 18. Most users do not use a steady amount of bandwidth all the time, and ISP service-deliv- ery models reflect this. That is why many users of one access point, all streaming videos, will slow each other down. See Akamai Technologies, Internet Bottlenecks (White Paper, 2000), available at www.akamai.com/dl/whitepapers/Akamai_Internet_Bottlenecks _Whitepaper.pdf; Beat Liver & Gabriel Dermler, The E-Business of Content Delivery (IBM Research Paper), http://www.tik.ee.ethz.ch/~cati/paper/isqe99c.pdf. 19. See, e.g., Dynamic Platform Standards Project, Facing Reality on “Network Neutrality,” http://www.dpsproject.com (last visited May 15, 2007); Dynamic Platform Standards Project, Legislative Proposal: The Internet Platform for Innovation Act, http://www.dps project.com/legislation.html (last visited May 15, 2007). 20. Circumvention tools include anonymizers, VPNs, and Psiphon. See, e.g., Reporters Without Borders, Technical Ways to Get Around Censorship, http://www.rsf.org/article .php3?id_articleϭ15013#2 (last visited May 15, 2007) (providing an overview of differ- ent technologies that can be used to avoid censorship); Anonymizer: Free Web Proxy, Free Anonymizers and the List of Web Anonymizers List, http://www.freeproxy.ru/en/ free_proxy/cgi-proxy.htm (last visited May 15, 2007). For some skepticism that users can circumvent network neutrality restrictions, see William H. Lehr et al., Scenarios for the Network Neutrality Arms Race, 1 I’ J. C’ 607 (2007) (describing “techni- cal and non-technical countermeasures” ranging from letter-writing campaigns to end- to-end encryption that prevents an ISP from discerning the activity in which a user is en- gaging). 21. See Skype, http://skype.com (last visited May 15, 2007); Wikipedia, Skype, http://en .wikipedia.org/wiki/Skype (as of May 15, 2007, 17:45 GMT). 22. Notably, the Nintendo Wii has been configured in this manner. Although its Internet Channel software allows users to browse the entire Internet using the Wii, to date user- configurability of the home page and other features has been limited. See Wikipedia, In- ternet Channel, http://en.wikipedia.org/wiki/Internet_Channel (as of May 15, 2007,
304 Notes to Page 182 07:00 GMT); Wii, The Developers Talk About the Internet Channel, http://us.wii .com/story_internet.jsp (last visited May 15, 2007). The Playstation 3 has similar fea- tures. See Network-internetbrowser, http://www.us.playstation.com/PS3/network/ internetbrowser (last visited May 15, 2007). 23. Cable Televison Consumer Protection and Competition Act of 1992, Pub. L. No. 102- 385, 106 Stat. 1460 (codified as amended in scattered sections of 47 U.S.C.). 24. A large, but far from comprehensive, list of community public access television organi- zations that have used the provisions of the 1992 Act is available through the Google Di- rectory. See Google Directory, Public Television, http://www.google.com/Top/ Arts/ Television/Networks/North_America/United_States/PBS/(last visited May 15, 2007). See generally Turner Broadcasting Sys., Inc. v. FCC, 520 U.S. 180 (1997); L L- , P A T: A’ E S (1999); Nancy Whitmore, Congress, The U.S. Supreme Court and Must-Carry Policy: A Flawed Economic Analysis, 6 C. L. P’ 175 (2001); Harris J. Aaron, Note, I Want My MTV: The Debate Over Digital Must-Carry, 80 B.U. L. R. 885 (2000); C-Span, Must Carry, http://www.mustcarry.org/mustcarry.asp (providing short updates on the status of FCC action regarding proposals regarding must-carry); C-Span, About Us, http:// 12.170.145.161/about/index.asp?codeϭAbout (last visited May 15, 2007); Wikipedia, Must-Carry, http://en.wikipedia.org/wiki/Must-cary (as of May 15, 2007, 07:00 GMT). 25. See J C. G, A A C 2-62 (2006); B M. C & S M. G, C P T 410–17 (2001); Reply Comments of the Staff of the FTC, In re Satellite Carrier Compulsory License, Docket No. RM 98-1 (1998), available at http://www.ftc.gov/be/v980004.shtm. To be sure, the impact of must-carry (and what would happen without it) was hotly debated through years of constitutional litigation and thousands of pages of data and expert tes- timony. See Turner Broadcasting System, Inc., v. Federal Communications Commis- sion, 520 U.S. 180 (1997). The district court majority opinion in the case concluded that a number of broadcasters could be threatened in the absence of must-carry, Turner Broadcasting v. FCC, 910 F. Supp. 734 755 (D.D.C. 1995), but Judge Williams’s dis- sent is persuasive that much of the data offered was conclusory and self-interested. 26. Use of the Carterfone Device in Message Toll Tel. Serv., 13 F.C.C.2d 420 (1968). 27. See Tim Wu, Wireless Net Neutrality: Cellular Carterfone on Mobile Networks (New Am. Found. Wireless Future Working Paper No. 17, Feb. 2007), available at http:// ssrn.com/abstractϭ962027; Petition to Confirm a Consumer’s Right to Use Internet Communications Software and Attach Devices to Wireless Networks, supra note 10. For a description of Steve Jobs’s claim of safety as a reason for the iPhone to remain tethered, see Katie Hafner, Altered iPhones Freeze Up, N.Y. T, Sep. 29, 2007, available at http://www.nytimes.com/2007/09/29/technology/29iphone.html. 28. The U.S. Telecommunications Act of 1996 sought to create a market in third-party ca- ble boxes, but these boxes would not be able to make use of the cable network to provide independent services—and even allowing third-party vendors to provide boxes func- tionally identical to the ones offered by the cable companies has proven difficult, as the Federal Communications Commission has tried to balance cable company requests for
Notes to Pages 182 –84 305 delays with a desire to implement competition. See Posting of Art Brodsky to Public Knowledge Policy Blog, Consumer and Public Interest Groups Ask FCC to Enforce Set-Top Box Choices (Nov. 15, 2006, 15:30), http://www.publicknowledge.org/node/718. The FCC has granted some waivers. See FCC, Memorandum Opinion and Order in re Cablevision Systems Corporation’s Request for Waiver of Section 76.1204(a)(1) (Jan. 10, 2007), available at http://hraunfoss.fcc.gov/edocs_public/attachmatch/DA-07- 48A1.pdf; FCC, Memorandum Opinion and Order in re Bend Cable Communica- tions, LLC Request for Waiver of Section 76.1204(a)(1) ( Jan. 10, 2007), available at http://hraunfoss.fcc.gov/edocs_public/attachmatch/DA-07-47A1.pdf. However, oth- ers have been denied. FCC, Memorandum Opinion and Order in re Comcast Corpora- tion, LLC Request for Waiver of Section 76.1204(a)(1) ( Jan. 10, 2007), available at http://hraunfoss.fcc.gov/edocs_public/attachmatch/DA-07-49A1.pdf; Posting of Cow- boy Neal to Slashdot, FCC Opens Market for Cable Boxes (Jan. 11, 2007, 21:51), http:// hardware.slashdot.org/article.pl?sidϭ07/01/12/0043249. See Press Release, FCC, Me- dia Bureau Acts on Requests for Waiver of Rules on Integrated Set-Top Boxes and Clar- ifies Compliance of Downloadable Conditional Access Security Solution (Jan. 10, 2007), available at http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-269446A1 .pdf, for information regarding decisions on integrated boxes, and Todd Spangler, FCC: Set-Top Fines Capped at $325K, M N, Feb. 15, 2007, http://www .multichannel.com/article/CA6416753.html, for general information about the rul- ings. 29. United States v. Microsoft Corp., 84 F. Supp. 2d 9, 19 (D.D.C. 1999). 30. See id. at 43 – 98. 31. See Jonathan Zittrain, The Un-Microsoft Un-Remedy: Law Can Prevent the Problem That It Can’t Patch Later, 31 C. L. R. 1361 (1999). Microsoft was also found to be maintaining its OS monopoly by disadvantaging the JAVA programming environment, which is meant to allow code to be platform-independent. 32. This does not mean that appliance makers can legally punish those who figure out how to tinker with their products. See Lexmark Int’l, Inc., v. Static Control Components, Inc., 387 F.3d 522 (6th Cir. 2004); Static Control Components, Inc. v. Lexmark Int’l, Inc., 2006 U.S. Dist. LEXIS 94438 (E.D. Ky. 2006) (holding that a microchip created to enable a competitor’s print cartridges to work with the original manufacturer’s printer did not violate the manufacturer’s copyright). 33. See Brett Frischmann, An Economic Theory of Infrastructure and Commons Management, 89 M. L. R. 917, 1015 –20 (2005); Barbara Van Schewick, Towards an Economic Framework for Network Neutrality Regulation, 5 J. T. H T. L. 329, 378– 82 (2007). 34. See, e.g., N.Y. R P. A L § 522 (Consol. 2007). 35. See, e.g., Di Leo v. Pecksto Holding Corp., 109 N.E.2d 600 (N.Y. 1952). 36. See R (S) C § 90 (1981). 37. See generally Joseph William Singer, The Reliance Interest in Property, 40 S. L. R. 611 (1988). 38. Posting of Ryan Block to Engadget, A Lunchtime Chat with Bill Gates, http://www. engadget.com/2007/01/08/a-lunchtime-chat-with-bill-gates-at-ces/(Jan. 8, 2007, 14:01).
306 Notes to Pages 184–87 39. However, Microsoft’s End User License Agreement limits damages to the amount paid for the software. See, e.g., EULA for Windows XP, § 18, http://www.microsoft.com/ windowsxp/home/eula.mspx; EULA for Vista, § 25, http://download.microsoft.com/ documents / useterms / Windows%20Vista_Ultimate_English_36d0fe99-75e4-4875- 8153-889cf5105718.pdf. 40. See Google, Google Desktop—Features, http://desktop.google.com/features.html# searchremote (last visited May 15, 2007). 41. Matthew Fordahl, How Google’s Desktop Search Works, MSNBC., Oct. 14, 2004, http://www.msnbc.msn.com/id/6251128/. 42. 467 U.S. 735 (1984). 43. Id. at 743. 44. See, e.g., Declan McCullagh, Police Blotter: Judge Orders Gmail Disclosure, CN N., Mar. 17, 2006, http://news.com.com/PoliceϩblotterϩJudgeϩordersϩ Gmailϩdisclosure/2100-1047_3-6050295.html (reporting on a hearing that contested a court subpoena ordering the disclosure of all e-mail messages, including deleted ones, from a Gmail account). 45. Orin Kerr, Search and Seizure: Past, Present, and Future, O E L- H (2006). 46. Cf. Orin S. Kerr, Searches and Seizures in a Digital World, 119 H. L. R. 531, 557 (2005) (“Under Arizona v. Hicks (480 U.S. 321 (1987)), merely copying information does not seize anything.” (footnote omitted)). 47. See, e.g., Google, Google Privacy Policy, http://www.google.com/privacypolicy.html (last visited Apr. 6, 2007) (noting that Google discloses personal information only when it has “a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or en- forceable governmental request, . . . (d) protect against imminent harm to the rights, property or safety of Google, its users or the public as required or permitted by law”). 48. See Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to Amending It, 72 G. W. L. R. 1208, 1208 – 09 (2004). 49. See 50 U.S.C. § 1861(a) (Supp. III 2003). 50. See id. § 1861(c)–(d). 51. See Letter from William E. Moschella, Assistant Att’y Gen., to L. Ralph Mecham, Dir., Admin. Office of the U.S. Courts (Apr. 30, 2004), available at http://www.fas.org/irp/ agency/doj/fisa/2003rept.pdf; Letter from William E. Moschella, Assistant Att’y Gen., to J. Dennis Hastert, Speaker, U.S. House of Repres. (Apr. 1, 2005), available at http:/ /www.fas.org/irp/agency/doj/fisa/2004rept.pdf; Letter from William E. Moschella, Assistant Att’y Gen., to Nancy Pelosi, Speaker, U.S. House of Repres. (Apr. 27, 2007), available at http://www.fas.org/irp/agency/doj/fisa/2006rept.pdf; see also O I G., A R F B I’ U N S L (2007), available at http://www.usdoj.gov/oig/special/ s0703b/final.pdf. Some have suggested that the Justice Department may have misused the authority granted to it by FISA. See, e.g., Dan Eggen & Susan Schmidt, Secret Court RebuVs Ashcroft, W. P, Aug. 23, 2002, at A01, available at http://www.washing- tonpost.com/ac2/wp-dyn/A51220-2002Aug22?languageϭprinter; Carol D. Leonnig,
Notes to Pages 187 –90 307 Secret Court’s Judges Were Warned About NSA Spy Data, W. P, Feb. 9, 2006, at A01, available at http://www.washingtonpost.com/wp-dyn/content/article/2006/02/ 08/AR2006020802511_pf.html. 52. See USA PATRIOT Improvement and Reauthorization Act of 2005, 18 U.S.C. § 2709(c) (2006). This provision has been found unconstitutional in Doe v. Gonzales, 500 F.Supp.2d 879 (S.D.N.Y. 2007). 53. See 12 U.S.C. § 3414(a)(5)(A), (D) (2000 & Supp. IV 2004); 15 U.S.C. §§ 1681u, 1681v(a) (2000 & Supp. IV 2004); 18 U.S.C. § 2709(a) (2000 & Supp. IV 2004); 50 U.S.C. § 436 (2000). 54. See 18 U.S.C. § 2709(a) (2000). 55. See id. § 2709(b). 56. See Barton Gellman, The FBI’s Secret Scrutiny, W. P, Nov. 6, 2005, at A1. 57. See John Solomon, FBI Finds It Frequently Overstepped in Collecting Data, W. P, June 14, 2007, at A1. 58. See The Company v. United States, 349 F.3d 1132, 1133 (9th Cir. 2003) (establishing that eavesdropping on vehicle operators could not be allowed, primarily because it dis- abled the proper functioning of the company’s communication with the vehicle if there were to be an emergency); see also Doe v. Ashcroft, 334 F. Supp. 2d 471, 475 (S.D.N.Y. 2004) (holding that prohibiting an ISP from communicating its receipt of a national se- curity letter is an impermissible prior restraint on speech); supra Ch. 5, Regulability and the Tethered Appliance. 59. 365 U.S. 610 (1961). 60. See id. at 610, 615 –18. 61. See Warshak v. United States, 490 F.3d 455 (6th Cir. 2007); United States v. D’Andrea, 2007 WL 2076472, *3 (D. Mass. July 20, 2007) (quoting Warshak v. United States, 490F.3d 455); cf. LF, 1 S S § 2.6 at 721 (4th ed. 2006). But cf. U.S. v. Lifshitz, 369 F.3d 173, 190 (2d Cir. 2004) (noting that individuals “may not, however, enjoy such an expectation of privacy in transmissions over the Internet or e-mail that have already arrived at the recipient,” in a suit involving a probationer); U.S. v. Hambrick, 225 F.3d 656 (4th Cir. 2000) (holding that consumers have no legitimate expectation of privacy in noncontent consumer information, such as name and billing address, provided to their ISP). 62. Orin Kerr, The Volokh Conspiracy, A Series of Posts on Warshak v. United States, http://volokh.com/posts/1182208168.shtml (last visited June 23, 2007). 63. See Posting of Jacobson to Free Software Found. Blog on GPL Compliance and Li- censing, Employers: Don’t Panic, http://www.fsf.org/blogs/licensing/nopanicing (Feb. 17, 2006, 15:52). 64. See 17 U.S.C. § 512 (2000) (defining the DMCA safe harbor protections). 65. See James Bessen & Robert M. Hunt, An Empirical Look at Software Patents, 16 J. E. M. S. 157 (2007). 66. Id. 67. See James Bessen & Robert M. Hunt, The Software Patent Experiment, 14–15 (Research on Innovation Working Paper, 2004), available at http://www.researchoninnovation .org/softpat.pdf. Software companies that assert strong intellectual property rights can
308 Notes to Pages 190–91 also deter the work of standards-setting organizations by claiming ownership of some part of a standard. See Mark Lemley, Intellectual Property Rights and Standard-Setting Or- ganizations (Boalt Working Papers in Public Law, Paper No. 24, 2002), available at http://repositories .cdlib.org/boaltwp/24/. 68. See Carl Shapiro, Navigating the Patent Thicket: Cross Licenses, Patent Pools, and Standard Setting, in I P E 12 (2001), available at http://faculty .haas.berkeley.edu/shapiro/thicket.pdf. 69. In Mazer v. Stein, 347 U.S. 201, 217 (1954), a distinction was made between copyright and patent: “Unlike a patent, a copyright gives no exclusive right to the art disclosed; protection is given only to the expression of the idea—not the idea itself.” Over-patent- ing can be seen in U.S. Patent & Trademark Office, Questions and Answers—USPTO, http://www.uspto.gov/main/faq/index.html (last visited May 15, 2007). One manifes- tation of the breadth of what can be patented is the famous patent issued in 2002 for swinging sideways while on a swing. That patent was issued to a five-year-old child. See U.S. Patent No. 6,368,227 (issued Apr. 9, 2002). 70. See Posting of Adrian Kingsley-Hughes to Gear for Geeks, Ballmer: Linux “Infringes our intellectual property” http://blogs.zdnet.com/hardware/?pϭ154 (Nov. 17, 2006, 06:55), discussing Steve Ballmer’s assertion that Linux infringes Microsoft’s patents at the Pro- fessional Association for SQL Server conference in Seattle on November 16, 2006); Roger Parloff, Microsoft Takes on the Free World, F, May 14, 2007, http://money .cnn.com / magazines / fortune / fortune_archive / 2007 / 05 / 28 / 100033867 / index .htm?sourceϭyahoo_quote; Posting of Cory Doctorow to BoingBoing, Ballmer: Linux Users Are Patent-Crooks http://www.boingboing.net/2006/11/17/ballmer_linux_users _.html (Nov. 17, 2006, 07:44). For more information on the third version of the Gen- eral Public License, see GPLv3 Final Discussion Draft Rationale, http://gplv3.fsf.org/ rationale,pdf, at 24, and GPLv3 Process—March update, http://gplv3.fsf.org/process- definition. 71. Ronald J. Mann, Do Patents Facilitate Financing in the Software Industry?, 83 T. L. R. 961, 978 – 82 (2005). 72. See 17 U.S.C. § 507 (2000); 35 U.S.C. § 286 (2000). For patents, the statute of limita- tions applies only to monetary damages; injunctions may be prevented through the doc- trines of estoppel and laches. See A. C. Aukerman Co. v. R. L. Chaides Constr. Co., 960 F.2d 1020, 1040 – 43 (Fed. Cir. 1992). Other countries set different time limits for their statute of limitations. See, e.g., Doerte Haselhorst, German IP Law Update, IP I- : E, Winter 2002, http://www.howrey.com/europe/newsletter/Winter 2002a/10.html; Posting of Patent Hawk to Patent Prospector, Patent Litigation in China, http://www.patenthawk.com/blog/2006/04/patent_litigation_in_china.html (Apr. 30, 2006, 14:17). 73. See Zittrain, supra note 31. 74. Laches is defined as “[u]nreasonable delay in pursuing a right or claim—almost always an equitable one—in a way that prejudices the party against whom relief is sought,” or as “[t]he equitable doctrine by which a court denies relief to a claimant who has unrea- sonably delayed in asserting the claim, when that delay has prejudiced the party against whom relief is sought,” B’ L D 891 (8th ed. 2004). The use of the
Notes to Pages 192 –96 309 laches defense to prevent sandbagging is seen, for example, in Webster Electric Co. v. Splitdorf Electrical Co., 264 U.S. 463 (1924) (denying claims of patent infringement where the rights-holder “stood by and awaited developments” for eight years), and Woodbridge v. United States, 263 U.S. 50 (1923) (rendering patent rights unenforceable where an inventor made claims after a nine-year delay to maximize profits). However, the bounds of the laches doctrine remain largely unclear. See, e.g., Lynda Calderone & Tara Custer, Prosecution Laches as a Defense in Patent Cases, Flaster Greenberg Newsletter (Nov. 2005), available at http://www.flastergreenberg.com/pdf/PatentArtic_prf3.pdf; Symbol Technologies v. Lemelson, 422 F. 3d 1378 (Fed. Cir. 2005) (showing that courts may be reluctant to accept laches except under extreme circumstances). 75. Claims might allege that proprietary code infringes a free software license by incorporat- ing free software. Much free software is copylefted, a licensing scheme that allows anyone to freely modify and copy it, but not to incorporate it into proprietary code. See GNU Project, What Is Copyleft?, http://www.gnu.org/copyleft/ (last visited May 15, 2007); Wikipedia, Copyleft, http://en.wikipedia.org/wiki/Copyleft (as of May 15, 2007, 06:00 GMT). 76. See, e.g., L L, F C: H B M U T L L D C C C (2004). 77. Y B, T W N 278 (2006). 78. Id. at 275. 79. 17 U.S.C. § 504 (West 2006). 80. See Creative Commons, Choose a License available at http://www.creativecommons .org/license/ (last visited Mar. 22, 2007). 81. One example of such an authentication system is Microsoft’s Sender ID. See Microsoft, Sender ID, http://www.microsoft.com/mscorp/safety/technologies/senderid/default .mspx (last visited May 15, 2007). 82. See, e.g., David R. Johnson et al., The Accountable Internet: Peer Production of Internet Governance, 9 V. J.L. T. 9 (2004), available at http://www.vjolt.net/vol9/issue 3/v9i3_a09-Palfrey.pdf (discussing the imperfections of filtration). 83. See Yochai Benkler, Some Economics of Wireless Communications, 16 H. J.L. T. 25 (2002) (suggesting that open wireless networks will be more efficient at optimizing wireless communications capacity than spectrum property rights will be). 84. See Michel Marriott, Hey Neighbor, Stop Piggybacking on My Wireless, N.Y. T, Mar. 5, 2006, § 1, at 11 (explaining some of the dangers of open wireless networks). 85. See, e.g., 4 M B. N D N, N C § 12.04[3] (2005). 86. As noted in Chapter 6, one might argue in Wikipedia’s case that anyone editing Wikipedia is actually an agent of Wikipedia, and therefore not “another” service pro- vider under 47 U.S.C. § 230(c). See Ch. 6, note 49. 87. Geoff Goodell et al., Blossom: A Perspective Access Network, http://afs.eecs.harvard .edu/~goodell/blossom (last visited May 15, 2007) (describing the philosophy, design objectives, and implementation of the Blossom network, which seeks to allow users to specify the perspective from which they view Internet resources). 88. See Owen Gibson, New York Times Blocks UK Access to Terror Story, G, Aug. 30,
310 Notes to Pages 196–97 2006, at 4, available at http://www.guardian.co.uk/terrorism/story/0,,1860876,00 .html; Tom Zeller Jr., Times Withholds Web Article in Britain, N.Y. T, Aug. 29, 2006, at C7, available at http://www.nytimes.com/2006/08/29/business/media/ 29times.html. For the original New York Times article, see Don Van Natta Jr. et al., De- tails Emerge in British Terror Case, N.Y. T, Aug. 28, 2006, http://www.nytimes .com/2006/08/28/world/europe/28plot.html. 89. For most arguments of this type, one implication is that “grassroots”-style democracy in the form of mass public participation will be more democratic on the Internet than in traditional governmental settings. But see Neil Weinstock Netanel, Cyberspace Self-Gov- ernance: A Skeptical View from Liberal Democratic Theory, 88 C. L. R. 395 (2000). Netanel argues that the sorts of principle-based checks in most democracies, such as an- tidiscrimination principles and equality in the basic rights of citizenship, are not sustain- able in an unregulated cyberspace environment. As applied in this case, Netanel’s argument might cast doubt on the net worth of “tricks” or technologies that seem to si- multaneously promote democracy and undermine state sovereignty. See id. at 412–27 (discussing cyberpopulism); cf. Andy Kessler, Network Solutions, W S. J., Mar. 24, 2007, at A11 (describing the communities enabled by Facebook, in which user-specified preferences and privacy are carefully maintained in order to facilitate user openness). 90. L L, C: V 2.0, 309 (2006). 91. In this case, the distinction is not between conduct rules and decision rules, but between conduct rules and enforcement. M D-C, H T: E L, S, M 125 –72 (2002); see also Gautham Rao, The Federal Posse Comitatus Doctrine: Slavery, Compulsion, and Statecraft in Mid-Nineteenth Century America, 26.1 L. H. R. (forthcoming 2008) (describing the difficulties of per- suading U.S. citizens in the North to assist in the return of escaped slaves to the South before the Civil War), available at http://www.press.uillinois.edu/journals/lhr/rao26_1 .pdf. 92. See Tim Wu, When Code Isn’t Law, 89 V. L. R. 679, 707 (2003) (disputing Lessig’s ar- gument and suggesting that instead of looking at code as law, society should understand code as a mechanism for avoiding and thus shaping law, in a similar fashion to how tax lawyers look for loopholes); id. at 689 (analyzing law-following behavior using an eco- nomic compliance model, which states that people obey laws when disobedience yields greater harms than benefits, and therefore concluding that code—and, by extension, code’s ability to circumvent regulation—can easily be understood as a productive part of the process of law). 93. In May 2007, anonymous browsing services had the following use levels as studied by Hal Roberts of Harvard’s Berkman Center for Internet & Society. Anonymizer: no data; dynaweb: 24 mil hit/day/700k users/day est.; ultrareach: 70 mil hits/day/1mil users/ day est.; circumventor: 30 installs/day; psiphon: 8,000 servers/80,000 users est.; jap: 6,000 concurrent clients; tor: 1 Gbps. E-mail from Hal Roberts to Jonathan Zittrain (May 31, 2007 at 21:44 EDT) (on file with the author). 94. See, e.g., File Pile, http://www.filepile.org (last visited May 15, 2007). 95. Oink, http://oink.me.uk (last visited May 15, 2007).
Notes to Pages 197 –202 311 96. See Doug Lichtman & David Jacobson, Anonymity a Double-Edged Sword for Pirates Online, C T., Apr. 13, 2000, at N25 (describing the music industry’s at- tempt to “take aim at the pirates’ ships” by flooding file-sharing sites with thousands of decoy files with names similar to popular songs). 97. For one such proposal, see W W. F III, P K 199 ‒259 (2004). But see Salil Mehra, The iPod Tax: Why the Digital Copyright System of American Law Professors’ Dreams Failed in Japan, 79 U. C. L. R. (forthcoming 2008), available at http://ssrn.com/abstract ϭ1010246 (noting that a digital recording tax in Japan similar to the proposals made by Fisher and others failed to produce its intended result). 98. See, e.g., Terry Frieden, 27 Charged in Child Porn Sting, CNN., Mar. 16, 2006, http://www.cnn.com/2006/LAW/03/15/childporn.arrests/index.html (describing a child pornography bust by the U.S. Department of Justice in early 2006 and the use of Internet security measures to try to keep file-sharing out of the eye of the law, and showing that the eventual infiltration of this group by law enforcement was due to the fact the group was open—even if only a little—to new members not personally known by existing members). 99. See, e.g., R J. B, N, T G I 150 (2006) (noting, in the context of a general analysis of the effects of networks on terror- ism and global conflict, that Al Qaeda has been “increasing its use of the Internet for propaganda, recruiting and training purposes”); G M, U T- 406 –12 (2003) (describing how the Internet facilitates the interests of terror- ists, such as through their use of chat rooms, which improve communication with new recruits and existing members, especially when members are separated by a large dis- tance); D. W, T T C W 39 (2004) (discussing Internet use by the Liberation Tigers of Tamil Elam, in Sri Lanka, to “pump out propaganda and to recruit their ranks”). See generally G W, T I (2006); 100. B, supra note 77, at 287– 88. 101. See Isaiah Berlin, Two Concepts of Liberty, in F E L 122 (1969). CHAPTER 9. MEETING THE RISKS OF GENERATIVITY 1. A C. S’ H, E. W, R, C- R C, at § II (1973), available at http://aspe.hhs.gov/ datacncl/1973privacy/tocprefacemembers.htm. 2. See Daniel J. Solove, Privacy and Power: Computer Databases and Metaphors for Infor- mation Privacy, 53 S. L. R. 1393 (2001) (examining the dangers to personal pri- vacy posed by electronic databases). 3. See generally id. 4. U.S. S. C. G’ O U.S. H. G’ O S. G’ I. I R, L H P A 1974, at 9 –28, 97–150, available at http://www.loc.gov/rr/frd/Military_Law/LH_
312 Notes to Pages 202–4 privacy_act-1974.html (reporting that Senate Bill 3418 initially covered all organiza- tions that collected personal information, but the Senate Committee on Government Operations limited the bill’s scope to the federal government). 5. Fair Credit Reporting Act § 602, 15 U.S.C.A. § 1681 (West 2006). 6. 18 U.S.C. § 2710 (2000). 7. Elec. Privacy Info. Ctr., The Video Privacy Protection Act, http://www .epic.org/privacy /vppa/ (last visited June 1, 2007). 8. S G, D N 1‒ 37 (2000). 9. Polly Sprenger, Sun on Privacy: “Get Over It,” W N, Jan. 26, 1999, http:// www.wired.com/news/politics/0,1283,17538,00.html. 10. Id. 11. E-mail from Jim Waldo, engineer, Sun Microsystems, to Jonathan Zittrain (Apr. 18, 2007, 23:02) (on file with author). 12. F I. C., A. S’ N E. F A C., F I D A 10–12, 15 (2001), available at http://www.freedomforum.org/publications/first/foi/foiinthedigitalage.pdf (finding that 89 percent of adults surveyed were concerned about personal privacy, and that nearly iden- tical percentages reported that they were concerned with crime, access to quality health care, and the future of the social security system); Humphrey Taylor, Most People Are “Privacy Pragmatists” Who, While Concerned About Privacy, Will Sometimes Trade It Off for Other Benefits, Mar. 19, 2003, http://www.harrisinteractive.com/harris_poll/index .asp?PIDϭ365 (discussing Harris Poll #17, which found that 69 percent of adults believe consumers have “lost all control of how personal information is collected and used by com- panies” and that 53 percent disagreed that “existing laws and organizational practices pro- vide a reasonable level of protection for consumer privacy policy”). 13. Jerry Kang & Dana Cuff, Pervasive Computing: Embedding the Public Sphere, 62 W. L L. R. 93 (2005) (discussing privacy concerns that emerge as mobile, wireless devices expand Internet connectivity); Jeffrey Rosen, A Watchful State, N.Y. T, Oct. 7, 2001, at A1, available at http://www.nytimes.com/2001/10/07/magazine/07 SURVEILLANCE.html?exϭ1172466000&enϭ6b3f27c506e13d53&eiϭ5070 (ex- amining the possible effects of biometric identification technology on personal privacy); Daniel J. Solove, Identity Theft, Privacy, and the Architecture of Vulnerability, 54 H- L.J. 1227 (2003) (considering identity theft and privacy in the context of public identification systems and information-storage architectures). 14. C. C. C § 1798.82 (West 2003). California legislators are currently considering a variety of different proposals to amend or even repeal portions of this statute. 15. StrongAuth, Inc., maintains a compendium of such disclosures, including those by Mas- terCard International, Polo/Ralph Lauren, Bank of America, and several universities. See Washington’s SSB 66043—On the Heel of CA’s SB 1386, Newsletter (StrongAuth, Inc.), May 5, 2005, http://www.strongauth.com/index.php?optionϭcom_content& taskϭview&idϭ36&Itemidϭ42. 16. Robert Lemos, Bank of America Loses a Million Customer Records, CNET N., Feb. 25, 2005, http://news.com.com/BankϩofϩAmericaϩlosesϩaϩmillionϩcustomer ϩrecords/2100-1029_3-5590989.html?tagϭst.rc.targ_mb. This type of data loss is not
Notes to Pages 204 –7 313 uncommon. As one study noted, “60 percent of [compromised record] incidents in- volved organizational mismanagement: personally identifiable information accidentally placed online, missing equipment, lost backup tapes, or other administrative errors.” Kris Erickson & Philip N. Howard, A Case of Mistaken Identity?: News Accounts of Hacker and Organizational Responsibility for Compromised Digital Records, 1980–2006, 12 J. C-M C. (2007), available at http://jcmc.indiana.edu. 17. Joris Evers, Credit Card Breach Exposes 40 Million Accounts, CNET N., June 20, 2005, http://news.cnet.co.uk/software/0,39029694,39190155,00.htm. 18. Hiawatha Bray, BC Warns Its Alumni of Possible ID Theft After Computer Is Hacked, B G, Mar. 17, 2005, at E3, available at http://www.boston.com/business/ technology / articles / 2005 / 03 / 17 / bc_warns_its_alumni_of_possible_id_theft_ after_computer_is_hacked/. 19. See Privacy Rights Clearinghouse, A Chronology of Data Breaches, http://www.privacy rights.org/ar/ChronDataBreaches.htm (last visited June 1, 2007). 20. Amazon’s Old Customers “Pay More,” BBC N, Sept. 8, 2000, http://news.bbc.co.uk/ 2/hi/business/914691.stm. 21. For more on price discrimination for information goods, see William Fisher, When Should We Permit Differential Pricing of Information? (2007) (working draft, on file with author). 22. See Paul Saffo, Sensors: The Next Wave of Infotech Innovation, http://www.saffo.com/ essays/sensors.php (last visited June 1, 2007). 23. See Gordon E. Moore, Cramming More Components onto Integrated Circuits, E- , Apr. 19, 1965, available at http://download.intel.com/research/silicon/moores paper.pdf. 24. Michael McCahill & Clive Norris, CCTV in London 6 –7 (Urban Eye Project, Working Paper No. 6, 2002), available at http://www.urbaneye.net/results/ue_wp6.pdf. 25. More information on the original project’s results and further efforts is available at the clickworkers site. See Clickworkers, http://clickworkers.arc.nasa.gov/top (last visited June 1, 2007). 26. Y B, T W N 69 (2006). 27. See supra note 25 and accompanying text. 28. Luis von Ahn, Presentation for Google TechTalk on Human Computation (Oct. 26, 2006), available at http://video.google.com/videoplay?docidϭ-8246463980976635143. 29. Cf. B, supra note 26, at 81 (discussing the potential for digital proofreading). 30. B, supra note 26, at 33, 76; see also Jessica Litman, Sharing and Stealing, 27 H- C. E. L.J. 1, 39 – 50 (2004) (examining the concept of public activity de- rived from compiling private activity in the context of online media sharing and P2P networks). 31. See SearchEngines.com, Click Popularity—DirectHit Technology Overview, http:// www.searchengines.com/directhit.html (last visited June 1, 2007); see also Google, Google Searches More Sites More Quickly, Delivering the Most Relevant Results, http://www.google.com/technology/ (last visited June 1, 2007) (explaining Google’s PageRank search system). 32. For a detailed discussion of captchas, see Luis von Ahn et al., CAPTCHA: Using Hard
314 Notes to Pages 207–9 AI Problems for Security, available at http://www.cs.cmu.edu/~biglou/captcha_crypt .pdf. 33. For a detailed discussion of captchas, spammers’ workarounds, and human computa- tion, see von Ahn, supra note 28. For his slides, see http://www.cs.cmu.edu/~biglou/ cycles.ppt. 34. Id. 35. E-mail from Luis von Ahn to Jonathan Zittrain (May 22, 2007) (on file with author). 36. The use of pornography in motivating individuals to fill in captchas has been suggested but not proven. 37. See von Ahn, supra note 28. 38. See Brad Stone, Captchas, Online Gatekeepers Against Spam, Need an Overhaul, I’ H T., June 11, 2007, available at http://www.iht.com/articles/2007/06/11/ business/codes.php. 39. See Posting of Ben Maurer to Exploring, reCAPTCHA: A New Way to Fight Spam, E- (May 23, 2007), http://bmaurer.blogspot.com/2007/05/recaptcha-new-way- to-fight-spam.html (May 23, 2007, 16:31). 40. J R, T N C: R S F A- A 23 (2004); Jeffrey Rosen, The Naked Crowd: Balancing Privacy and Security in an Age of Terror, 46 A. L. R. 607, 610 (2004) (“[I]t was proposed after September 11 to engage in ambitious forms of what Roger Clarke has called ‘mass dataveillance’ to consolidate and analyze public and private data in the hope of unearthing unusual pat- terns that might predict suspicious activity.”). 41. See, e.g., F H. C, P I A 113 (1997) (proposing how notice could be used to protect privacy). 42. See, e.g., J R, T U G: T D P A 172–73 (2001) (explaining how, with the help of encryption, “individual In- ternet users could come close to realizing Louis Brandeis and Samuel Warren’s ideal” of privacy). 43. ShotSpotter is a company that offers some examples of this technology. See ShotSpotter, ShotSpotter Gunshot Location System (GLS) Overview, http://www.shotspotter.com/ products/index.html (last visited June 1, 2007) (providing an overview of the company’s products); Ethan Watters, Shot Spotter, W M, Apr. 2007, at 146–52, avail- able at http://www.shotspotter.com/news/news.html (discussing the use and effective- ness of this technology); see also ShotSpotter, ShotSpotter in the News, http://www .shotspotter.com/news/news.html (last visited June 1, 2007) (providing links to articles discussing the company and its products). 44. Sig Christenson, Border Webcams Rack Up Millions of Hits in a Month, S A E-N, Dec. 10, 2006, http://www.mysanantonio.com/news/metro/stories/ MYSA121106.01A.border_webcam.323e8ed.html. 45. Id. (“[S]tate officials Sunday tout[ed] it as a success beyond anyone’s dreams.”). 46. Assoc. Press, Texas Border Cam Test Catches 10 Illegal Immigrants, C. S-T, Jan. 8, 2007, http://www.suntimes.com/news/nation/201613,CST-NWS-bord08.article (“It seems to me that $20,000 per undocumented worker is a lot of money” (quoting state Rep. Norma Chavez) [internal quotation marks omitted]); Editorial, Virtual Wall
Notes to Pages 209 –12 315 a Real Bust That Didn’t Come Cheap, S A E-N, Jan. 19, 2007, at 6B (“[T]he results are in: The plan bombed.”). 47. See D B, T T S: W T F U C B P F 52– 54, 149 –78 (1999). 48. See Neal Feigenson & Meghan A. Dunn, New Visual Technologies in Court: Directions for Research, 27 L. H B. 109 (2003) (discussing how recent advances in visual technologies will affect legal decision-making, with reference to many cases that have al- tered the way courtrooms incorporate new technologies). 49. The Anderson County jailcam was discontinued as of November 27, 2006; the Web site no longer discusses its removal. It was formerly accessible at http://www.tnacso.net/ cont/jailcam.php. 50. Assoc. Press, Tenn. Jail Web Cam Jeopardizes Security, B G, Nov. 25, 2006, http: //www.boston.com/news/odd/articles/2006/11/25/tenn_jail_web_cam_jeopardizes _security/ (noting that Maricopa County, Arizona, also shut down its camera after los- ing a lawsuit by inmates alleging abuse of their rights). 51. In the aftermath of the September 11 attacks and the passing of the USA PATRIOT Act, the government has been increasingly likely to take an active role in issues of electronic surveillance. For an overview of surveillance law and its shifting usage by the govern- ment, see Daniel J. Solove, Reconstructing Electronic Surveillance Law, 72 G. W. L. R. 1264, 1278 – 80 (2004). 52. See D J. S, T D P: T P I- A 2–7, 13 –26 (2004) (expressing concern about the collection of infor- mation held in commercial databases, public records, and government files). 53. See Kang & Cuff, supra note 13, at 134 – 42. 54. The largest difference may arise from the fact that invasions of privacy implicate the dig- nity of individuals rather than firms’ profits, and thus there is no natural lobby to orga- nize against this personal intrusion. 55. Expert: LAPD Officers’ Behavior Not Unreasonable, ABC N, Nov. 11, 2006, http: //abcnews.go.com/GMA/story?idϭ2646425; Video: LA Police Brutality (posted by 3101010 on YouTube, Nov. 10, 2006), http://www.youtube.com/watch?vϭ7_ gFJJXL v28. 56. Video: Bus Uncle (posted by beautyjeojihyun on YouTube, May 11, 2006), http:// www .youtube.com/watch?vϭRSHziqJWYcM. 57. Id. 58. Hong Kong’s “Bus Uncle” Beaten Up by Three Men, C NA, June 8, 2006, http://www.channelnewsasia.com/stories/eastasia/view/212671/1/.html. 59. Jonathan Krim, Subway Fracas Escalates into Test of the Internet’s Power to Shame, W. P, July 7, 2005, at D1, available at http://www.washingtonpost.com/wp-dyn/ content/article/2005/07/06/AR2005070601953.html. 60. For details on Star Wars Kid, see Wikipedia, Star Wars Kid, http://en.wikipedia.org/ wiki /Star_Wars_kid (as of June 1, 2007, 10:00 GMT). 61. Star Wars Kid Is Top Viral Video, BBC N, Nov. 27, 2006, http://news.bbc.co.uk/2/ hi/entertainment/6187554.stm. 62. See, e.g., Heather Adler, Stephen Colbert Aims His Lightsaber at Star Wars, D.,
316 Notes to Pages 212–13 Aug. 24, 2006, http://www.dose.ca/celeb/story.html?idϭ10261eb6-0469-4198-a16a- 1f302275b2a9 (describing the Comedy Central show host’s mocking of the Star Wars Kid); Video: White & Nerdy (Google Video, Sept. 19, 2006), http://video.google.com/ videoplay?docidϭ1384277706451157121 (“Weird Al” Yankovic’s music video from his album “Straight Outta Lynwood,” which includes a scene imitating the Star Wars Kid). For a list of other pop-culture references, see Wikipedia, Star Wars Kid, supra note 60. 63. M T, M T’ A, P 2, at 10 (2003). 64. This was a lesson learned by George Allen, a Republican candidate in the 2006 U.S. Sen- ate campaign who was caught on camera calling an Indian supporter of his opponent by the derogatory epithet “macaca.” Carl Hulse, Senator Apologizes to Student for Remark, N.Y. T, Aug. 24, 2006, at A20, available at http://www.nytimes.com/2006/08/ 24/washington/24allen.html; see also Dale Eisman, Others Will Have “Macaca Mo- ments,” Pundits Say, V-P, Dec. 1, 2006, http://www.redorbit.com/news/ technology/751673/others_will_have_macaca_moments_pundits_say/index.html. 65. Such places, while private, are sometimes treated by the law as places of “public accom- modation,” in recognition of their hybrid status. This classification imposes some re- sponsibility on their owners for equal treatment of patrons. See 42 U.S.C. § 12181(7) (2000) (defining a public accommodation as a restaurant and inn, among other things, for purposes of the Americans with Disabilities Act); 42 U.S.C. § 2000a(b)(1)–(2) (2000) (classifying inns and restaurants as places of public accommodations for the pur- poses of the 1964 Civil Rights Act). 66. See Eric A. Posner & Cass R. Sunstein, The Law of Other States, 59 S. L. R. 131, 162 (2006) (“In a reputational cascade, people think that they know what is right, or what is likely to be right, but they nonetheless go along with the crowd in order to main- tain the good opinion of others. Suppose that Albert suggests that global warming is a se- rious problem and that Barbara concurs with Albert, not because she actually thinks that Albert is right, but because she does not wish to seem, to Albert, to be ignorant or indifferent to environmental protection. If Albert and Barbara seem to agree that global warming is a serious problem, Cynthia might not contradict them publicly and might even appear to share their judgment, not because she believes that judgment to be cor- rect, but because she does not want to face their hostility or lose their good opinion. It should be easy to see how this process might generate a cascade.”). New and unique ideas can have important effects, see generally M G, T T P: H L T C M B D (2000), but unless widely held views are consistently challenged, incorrect ideas can become deeply ensconced. See Cass R. Sunstein, A New Progressivism, 17 S. L. P’ R. 197, 210–11 (2006); see also I L. J, G (2d ed. 1982) (discussing how group pressure can lead members to agree to a result that they personally think is wrong). 67. See McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 360–61 (1995) (Thomas, J., concurring) (“There is little doubt that the Framers engaged in anonymous political writing. The essays in the Federalist Papers, published under the pseudonym of ‘Pub- lius,’ are only the most famous example of the outpouring of anonymous political writing that occurred during the ratification of the Constitution. . . . [T]he historical ev-
Notes to Pages 214 –15 317 idence indicates that Founding-era Americans opposed attempts to require that anony- mous authors reveal their identities on the ground that forced disclosure violated the ‘freedom of the press.’”). 68. TMZ Staff, Elisha: The B*tch Next Door!, TMZ., Nov. 14, 2006, http://www .tmz.com/2006/11/14/elisha-the-b-tch-next-door/. 69. Gawker Stalker, http://gawker.com/stalker/ (last visited June 1, 2007). 70. D W, S P L J: A U T W 104 (2002). 71. Traditionally, retailers, television networks, and movie theaters were forced to try to identify mainstream, popular choices. They had to favor middle-ground material be- cause they had only a limited amount of shelf space, prime-time hours, or screens, re- spectively, and needed to maximize their sales. Online marketplaces do not have that limitation: “A hit and a miss are on equal economic footing, both just entries in a data- base called up on demand, both equally worthy of being carried. Suddenly, popularity no longer has a monopoly on profitability.” Chris Anderson, The Long Tail, W, Oct. 24, 2004, http://www.wired.com/wired/archive/12.10/tail.html. 72. Flickr had approximately five hundred million photos as of May 2007. E-mail from Meagan Busath, Public Relations Representative, Flickr, to Jonathan Zittrain (May 24, 2007, 15:17 EDT) (on file with author). 73. D W, E M: T P N D- D (2007). 74. See Posting of Loren Baker to Search Engine Journal, Google, Neven Vision & Image Rec- ognition, http://www.searchenginejournal.com/google-neven-vision-image-recognition /3728/ (Aug. 15, 2006); Jacqui Cheng, Facial Recognition Slipped into Google Image Search, A T, May 30, 2007, http://arstechnica.com/news.ars/post/2007 0530-facial-recognition-slipped-into-google-image-search.html. 75. Adam Liptak, Driver’s License Emerges as Crime-Fighting Tool, but Privacy Advocates Worry, N.Y. T, Feb. 17, 2007, at A10, available at http://www.nytimes.com/2007/ 02/17/us/17face.html. 76. The Nuremberg Files, http://www.christiangallery.com/atrocity/ (last visited June 1, 2007). 77. See Planned Parenthood of Columbia/Willamette Inc. v. Am. Coal. of Life Activists, 422 F.3d 949 (9th Cir. 2005). 78. Abortion Cams: Shame Deters Abortion, http://www.abortioncams.com/ (last visited June 1, 2007). The Web site is premised on the belief that showing the images of clinic patients will either shame or scare women away from having an abortion. See How to Deter Abortion, http://www.abortioncams.com/deter.htm (last visited June 1, 2007) (“Would a preacher want to be photographed going into a whore house, would a Priest want to be photographed going into a sex chat room with grade school kids? Neither would a mother want to be photographed going in to kill her baby.”). 79. See Posting of Tom Owad to Applefritter, Data Mining 101: Finding Subversives Within Amazon Wishlists, http://www.applefritter.com/bannedbooks (Jan. 4, 2006, 19:37); see also Paul Marks, “Mashup” Websites Are a Dream Come True for Hackers, 190 N S- , May 12, 2006, at 28, available at http://www.newscientisttech.com/channel/
318 Notes to Pages 216–17 tech / electronic-threats / mg19025516.400-mashup-websites-are-a-hackers-dream- come-true.html. 80. Handschu v. Special Serv. Div., No. 71 Civ. 2203 (S.D.N.Y. Feb. 15, 2007), available at http://graphics.nytimes.com/packages/pdf/nyregion/20070215_nycruling.pdf. 81. Home Video: Utah Mall Shooting, FOX N, Feb. 16, 2007, http://www.foxnews .com/story/0,2933,252395,00.html. 82. Glenn Chapman, Internet Users Transformed into News Reporters, M E. T, Feb. 11, 2007, http://news.yahoo.com/s/afp/20070211/tc_afp/uscanadaitinternetmedia companynowpublicyahoo (“You have tens of millions of people around the world with cell phones with cameras connected to providers. It’s like having an army of stringers out.” (quoting Scott Moore, head of Yahoo News) (internal quotation marks omitted)). 83. Witness.org was founded with the idea that it would be easier to bring perpetrators to justice if there was photographic or video evidence of their crimes. Its mission is to use “video and online technologies to open the eyes of the world to human rights viola- tions.” Witness.org, About Witness, http://witness.org/index.php?optionϭcom_ content&taskϭview&idϭ26&Itemidϭ78 (last visited June 1, 2007). 84. Urs Gasser, Regulating Search Engines: Taking Stock and Looking Ahead, 8 Y J.L. T. 201, 202 (2006) (“Since the creation of the first pre-Web Internet search engines in the early 1990s, search engines have become almost as important as email as a primary online activity. Arguably, search engines are among the most important gatekeepers in today’s digitally networked environment.”); Stephen E. Arnold, Google: Search Be- comes an Application Platform 1 (2005) (unpublished position paper), available at http://islandia.law.yale.edu/isp/search_papers/arnold.pdf (“Just as calculations were one of the reasons for mainframes, search is one of the reasons why distributed, parallel, commodity-based network systems are the next computing platforms. The smartphone, the desktop computer, the Xbox game machine, and even the mainframe gain greater utility when linked to a computer similar to one built, owned, and operated by Google.”); Memorandum from Deborah Fallows et al., Pew Internet & Am. Life Proj- ect, on The Popularity and Importance of Search Engines 3 (2004), available at http://www.pew internet.org/pdfs/PIP_Data_Memo_Searchengines.pdf (“The avail- ability of reliable, easy-to-use search engines has transformed people’s connection to in- formation. For some, search engines are indispensable. Many people deeply rely on search engines to deliver vitally important information to them: 44% of searchers say that all or most of the searches they conduct are for information they absolutely need to find.”). 85. Pay-for-placement has existed from the first days of the Web’s commercialization. See Jeff Pelline, Pay-for-Placement Gets Another Shot, CNET N., Feb. 19, 1998, http: / / news.com.com / Pay-for-placementϩgetsϩanotherϩshot / 2100-1023_3- 208309.html. Until early 2007, Yahoo’s search engine placed the highest bidders’ ads be- fore the most relevant ads. Yahoo, however, switched to ranking based on relevance only, a change driven by significant competitive pressures. See Sara Kehaulani Goo, Yahoo Re- tools Ad Technology; Ranking System Ends Pay-for-Placement Ads in Search Results, W. P, Feb. 6, 2007, at D2 (“The whole notion that I can buy my way to the top [of spon-
Notes to Pages 217 –18 319 sored links] is something we do want to move beyond” (quoting Tim Cadogan, Vice President, Yahoo Search Marketing)). Of course, advertisers routinely pay for placement among sets of sponsored links included alongside search results in search engines like Ya- hoo and Google. 86. B, supra note 26, at 76. 87. Id. at 76‒ 80. 88. See Paul Resnick et al., The Value of Reputation on eBay: A Controlled Experiment, 9 E E. 79, 96, 98 ‒ 99 (2006), available at http://www.si.umich.edu/ ~presnick /papers/postcards/PostcardsFinalPrePub.pdf. 89. See, e.g., Paul Resnick et al., Reputation Systems, 43 C. ACM 45–48 (2000), avail- able at http://www.si.umich.edu/~presnick/papers/cacm00/reputations.pdf (noting that reputation systems protect anonymity while fostering reliable transactions); Paul Resnick & Richard Zeckhauser, Trust Among Strangers in Internet Transactions: Empiri- cal Analysis of eBay’s Reputation System, 11 A A M. 127 (2002), available at http://www.si.umich.edu/~presnick/papers/ebayNBER/RZNBERBodega Bay.pdf (noting that eBay’s system and others appear to work, probably with help from norms drawn from outside the online context); Chrysanthos Dellarocas, The Digitiza- tion of Word-of-Mouth: Promise and Challenges of Online Feedback, 49 M. S. 1407, 1417–21 (2003), available at http://ssrn.com/abstractϭ393042 (noting several ways that users can game the system, including changing their user name after receiving a bad rating). 90. Ina Steiner, eBay “Feedback Farms” Planted with One-Cent eBooks, AB., Oct. 3, 2006, http://www.auctionbytes.com/cab/abn/y06/m10/i03/s02. 91. Google did de-list BMW for creating dummy Web pages with key words in order to raise the ranking of its central Web site. BMW Given Google “Death Penalty,” BBC N, Feb. 6, 2006, http://news.bbc.co.uk/2/hi/technology/4685750.stm. Google, however, quickly showed mercy and relisted the site just three days later, casting some doubt on the effectiveness of the system when the perpetrator is an influential and important Web site. See Posting of Danny Sullivan to Search Engine Watch Blog, Welcome Back to Google, BMW—Missed You These Past Three Days, http://blog.searchenginewatch.com/ blog/060208-104027 (Feb. 8, 2006, 10:40). 92. Cyworld allows its users to decorate their pages by renting various digital accoutrements. While one’s home page has the metaphor of a physical home, every digital item within the home is rented rather than purchased. For example, a frame cover for a picture in the room costs $1.72 and lasts thirty days. See Cyworld, http://us.cyworld.com/main/ index.php (last visited June 1, 2007); Wikipedia, Cyworld, http://en.wikipedia.org/wiki /Cyworld (as of June 1, 2007, 19:00 GMT). 93. Cho Jin-seo, Cyworld Members Reach 20 Mil., K T, Feb. 5, 2007, http:// search.hankooki.com/times/times_view.php?termϭcyworldϩϩ&pathϭhan kooki3/ times/lpage/tech/200702/kt2007020519364411810.htm&mediaϭkt. 94. Jennifer Park, “I Was a Cyholic, Cyworld Addict,” ON, July 26, 2004, http:/ / english.ohmynews.com / articleview / article_view.asp?menuϭc10400&noϭ179108 &rel_noϭ1&back_url.
320 Notes to Pages 219–24 95. Lior Jacob Strahilevitz, “How’s My Driving?” for Everyone (and Everything?), 81 N.Y.U. L. R. 1699 (2006). 96. For example, dodgeball.com combines online friend lists and cell-phone text messag- ing to allow users to advertise their whereabouts to friends, see when they are near friends of friends, and even see when their crushes are nearby. See Dodgeball.com, http://www.dodgeball.com/ (last visited June 1, 2007). Loopt offers a similar service. See Loopt.com, Your Social Compass, https://loopt.com/loopt/sess/index.aspx (last visited Dec. 1, 2007); Meetro.com helps users chat over the Internet and connect with other Meetro users who live nearby. See Meetro, What Is Meetro?, http://meetro.com/ (last visited June 1, 2007). 97. One prominent recent example is found in the Seattle-based start-up Avvo, which pro- vides ratings for attorneys. An opaque system that generated low ratings for some prompted offended lawyers to consider pressing for damages to their practices. See Posting of John Cook to John Cook’s Venture Blog, Avvo’s Attorney Rating System Draws Fire, http://blog.seattlepi.nwsource.com/venture/archives/116417.asp#extended (June 8, 2007, 14:53). 98. Gasser, supra note 84, at 232– 33 (observing that search algorithms are often trade se- crets). 99. See Judit Bar-Ilan, Web Links and Search Engine Ranking: The Case of Google and the Query “Jew,” 57 J. A. S’ I. S. T. 1581 (2006). 100. Google, An Explanation of Our Search Results, http://www.google.com/explanation .html (last visited June 1, 2007) (“If you recently used Google to search for the word ‘Jew,’ you may have seen results that were very disturbing. We assure you that the views expressed by the sites in your results are not in any way endorsed by Google.”). 101. A C. S’ H, E. W, supra note 1. 102. See Pamela Samuelson, Five Challenges for Regulating the Global Information Society, in R G I S 321–22 (Chris Marsden ed., 2000) (describing how technological developments threaten existing means for protecting traditional values such as “privacy, innovation, and freedom of expression”). 103. It does not just happen on social networking sites; constitutional law scholar Laurence Tribe was distressed when a statement he posted on a family Web site became the sub- ject of public attention. R, T N C: R S F A A, supra note 40, at 164 – 65. 104. Nancy Blachman & Jerry Peek, How Google Works, http://www.googleguide.com/ google_works.html (last visited June 1, 2007). 105. See Samuelson, supra note 102, at 323 –24 (arguing that given the tediously slow na- ture of the harmonization process, nations may generally be better off seeking not com- plete harmonization but “policy interoperability,” broad agreement on goals that allow room for flexible implementation of those goals at a later date). 106. Martijn Koster, A Standard for Robot Exclusion, http://www.robotstxt.org/wc/no robots.html (detailing the genesis of robots.txt) (last visited June 1, 2007). 107. Id. 108. See, e.g., Yahoo!, Search Help, How Do I Prevent You from Indexing Certain Pages?, http://help.yahoo.com/lus/yahoo/search/webcrawler/slurp-04.html (last visited Dec.
Notes to Pages 224 –25 321 1, 2007); Microsoft Live Search, Site Owner Help: Control Which Pages of Your Web- site Are Indexed, http://search.msn.com.sg/docs/siteowner.aspx?tϭSEARCH_WEB MASTER_REF_RestrictAccessToSite.htm (last visited Dec. 1, 2007); Baidu, http:// www.baidu.com/search/robots.html (last visited June 1, 2007); Google, Webmaster Help Center: How Do I Request that Google Not Crawl Parts or All of My Site?, http: / / www.google.com / support / webmasters / bin / answer.py?answerϭ33570 &topicϭ8846 (last visited June 1, 2007). See generally Posting of Dan Crow to the Of- ficial Google Blog, Controlling How Search Engines Access and Index Your Website, http: / / googleblog.blogspot.com / 2007 / 01 / controlling-how-search-engines-access .html (Jan. 26, 2007, 11:36). 109. Though this is not to say that the robots.txt standard has indeed proved to be legally vulnerable in practice. In March 2007, German courts affirmed with A Painter v. Google that electing not to use robots.txt in fact granted an implied license for search engines to index a page. See Ben Allgrove, The Search Engine’s Dilemma, 2 J. I. P. L. P. 437 (2007). 110. See Jody Freeman, The Private Role in Public Governance, 75 N.Y.U. L. R. 543 (2000); Mark A. Lemley, Intellectual Property Rights and Standard-Setting Organiza- tions, 90 C. L. R. 1889 (2000); Pamela Samuelson, Questioning Copyright in Stan- dards, 48 B.C. L. R. 193 (2007) (describing the uniform standards underpinning the information society as “an integral part of the largely invisible infrastructure of the modern world,” and offering a thorough analysis of why and how courts should resist placing these standards under the scope of U.S. copyright protection). 111. See A. Michael Froomkin, [email protected]: Toward a Critical Theory of Cyber- space, 116 H. L. R. 749, 777– 96 (2003) (discussing the evolution of Internet standards setting). 112. ebay, Inc. v. Bidder’s Edge, 100 F. Supp. 2d 1058 (N.D. Cal. 2000). 113. 17 U.S.C. § 512(d) (2000). 114. Google prevailed, on a particularly favorable fact pattern, against one author-plaintiff challenging the search engine’s copying and distribution of his copyrighted works. Field v. Google, 412 F. Supp. 2d 1106 (D. Nev. 2006) (finding Google’s copying and distribution of the copyrighted works through cached links to be a fair use on grounds that offering access through its cache serves important social purposes and transforms rather than supersedes the original author’s use). 115. See Complaint, McGraw-Hill Companies, Inc. v. Google, No. 05-CV-8881 (S.D.N.Y. Oct. 19, 2005). 116. See Complaint, Author’s Guild v. Google, No. 05-CV-8136 (S.D.N.Y. Dec. 20, 2005). 117. Creative Commons Legal Code, http://creativecommons.org/licenses/by-nc-sa/2.5/ legalcode (last visited June 1, 2007). 118. In a case brought by Adam Curry against a Dutch tabloid after the tabloid attempted to republish several CC-licensed photos that Curry had posted on Flickr, the District Court of Amsterdam found that “[i]n case of doubt as to the applicability and the con- tents of the License, [Audax, the tabloid,] should have requested authorization for pub- lication from the copyright holder of the photos (Curry). Audax has failed to perform such a detailed investigation, and has assumed too easily that publication of the pho-
322 Notes to Pages 225–27 tos was allowed. Audax has not observed the conditions stated in the [Attribution- Noncommercial-Sharealike] License [ . . . ].” See Posting of Pamela Jones to Groklaw, Creative Commons License Upheld by Dutch Court, http://www.groklaw.net/article.php ?storyϭ20060316052623594 (Mar. 16, 2006, 06:05 EST). However, American law is not nearly so clear. Some commentators have suggested that in the interest of clarifying the enforceability of these rights in the United States, Creative Commons licensors, when faced with some infringement of the rights they have chosen to retain, should file cease and desist letters and force a legal decision on this issue. See Posting of John Pal- frey, Following up on the RSS/Copyright Debate, http://blogs.law.harvard.edu/palfrey/ 2006/07/28/following -up-on-the-rsscopyright-debate ( July 28, 2006, 17:02 EST). Until then, content publishers may have no way to grapple with the “widespread abuse” and piracy of works published under Creative Commons licenses. See Posting of Ethan Zuckerman to My Heart’s in Accra, Can Creative Commons and Commercial Ag- gregators Learn to Play Nice?, http://www.ethanzuckerman.com/blog/?pϭ900 (July 21, 2006, 15:32). But see Posting of Mia Garlick to Creative Commons Weblog, Creative Commons Licenses Enforced in Dutch Court, http://creativecommons.org/weblog/entry /5823 (Mar. 16, 2006) (questioning whether the legitimacy of Creative Commons li- censes should depend on judicial validation). 119. To be sure, it may be easy for the wishes expressed in a Creative Commons license to be respected, since nearly every variant of the license is designed to emphasize sharing among peers rather than restrictions. Variants that do not contemplate such sharing— for example, the Founder’s Copyright that asserts regular copyright protection but only for a limited term, or Developing Nations, which only relaxes copyright’s restrictions for certain states—are used hardly at all. See Creative Commons, License Statistics, http://wiki.creativecommons.org/License_statistics (last visited June 1, 2007). 120. See, e.g., Pamela Samuelson, Privacy as Intellectual Property?, 52 S. L. R. 1125, 1170 –73 (2000). 121. Wikipedia, Metadata, http://en.wikipedia.org/wiki/Metadata (as of June 1, 2007, 20:30 GMT). 122. Flickr allows users to record data such as shutter speed, exposure, date, photographer, geotagging data, and viewer comments. See, e.g., Flickr Camera Finder, http://www .flickr.com/cameras (last visited June 1, 2007). However, no convenient process exists for ensuring that this metadata remains attached to a photo when someone saves it to a hard drive or reposts it on a different site. 123. Some experiments have also attempted to empower individuals to make their prefer- ences clear at the point an image or video is initially captured. An example is Miguel Mora’s Identity Protection System, which would allow a sticker or badge to function as a signal for surveillance cameras to block an individual from their recording. See Miguel.Mora.Design, http://www.miquelmora.com/idps.html (last visited July 28, 2007). 124. T N, L M (1981); Wikipedia, Transclusion, http://en .wikipedia.org/wiki/Transclusion (as of June 1, 2007, 10:30 GMT). 125. Consider, for example, the Internet Archive. Proprietor Brewster Kahle has thus far
Notes to Pages 227 –30 323 avoided what one would think to be an inevitable copyright lawsuit as he archives and makes available historical snapshots of the Web. He has avoided such lawsuits by re- specting Web owners’ wishes to be excluded as soon as he is notified. See Internet Archive FAQ, http://www.archive.org/about/faqs.php (last visited June 1, 2007). 126. Moore v. Regents of the Univ. of Cal., 793 P.2d 479 (Cal. 1990). 127. Daniel Goleman, Normal Social Restraints Are Weakened in Cyberspace, I’ H T., Feb. 20, 2007, available at http://www.iht.com/articles/2007/02/20/business /email.php. 128. See John Suler, The Online Disinhibition Effect, 7 CP B. 321, 322 (2004) (noting how not having facial feedback with those we are addressing online allows us to ignore any negative emotional responses to our statements). 129. Yochai Benkler, Sharing Nicely: On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production, 114 Y L.J. 273 (2004). 130. See John Naughton, Our Changing Media Ecosystem, in U K O C—T N D 61 (Ed Richards, Robin Foster & Tom Kiedrowski eds., 2006). 131. Cf., e.g., Local Loan Co. v. Hunt, 292 U.S. 234, 244 (1934) (noting that providing debtors with a clean slate is “[o]ne of the primary purposes of the Bankruptcy Act”); Thomas H. Jackson, The Fresh-Start Policy in Bankruptcy Law, 98 H. L. R. 1393 (1985). 132. Such proscriptions may also prove difficult to reconcile with constitutional frame- works. See, e.g., Eugene Volokh, Freedom of Speech and Information Privacy: The Trou- bling Implications of a Right to Stop People from Speaking About You, 52 S. L. R. 1049 (2000). 133. See Jeffery Rosen, Privacy in Public Places, 12 C S. L. L 167, 189 (2000) (“[W]e have fewer opportunities to present ourselves publicly in all of our complexity; and, therefore, as more of our private lives are recorded in cyberspace, the risk that we will be unfairly defined by isolated pieces of information that have been wrenched out of context has increased dramatically.”); see also R, T N C: R S F A A, supra note 40, at 55 – 57 (2001) (describing how Larry Lessig was hurt by an e-mail discussing Microsoft that was taken out of context and then used against him). 134. See, e.g., R D J S, U W T W 207 (2004). 135. This kind of compelled speech would not be unprecedented. For much of the twenti- eth century, the FCC’s Fairness Doctrine forced broadcasters to air controversial public interest stories and provide opposing viewpoints on those issues. See Steve Rendall, The Fairness Doctrine: How We Lost It and Why We Need It Back, E, Jan./Feb. 2005, http://www.fair.org/index.php?pageϭ2053. Under President Reagan, the FCC re- pealed this doctrine in 1987. Id. Despite this administrative change, the Supreme Court has consistently interpreted the First Amendment to include the right not to speak in a line of compelled speech cases. See, e.g., Keller v. State Bar of Cal., 496 U.S. 1 (1990) (holding that lawyers could not be forced to pay bar association fees to sup-
324 Notes to Pages 230–32 port political messages with which they disagreed); Abood v. Detroit Bd. of Educ., 433 U.S. 915 (1977) (holding that teachers could not be forced to pay union fees to sup- port political messages with which they disagreed). 136. Posting of Joseph Nye to The Huffington Post, Davos Day 3: Internet Privacy and Rep- utational Repair Sites, http://www.huffingtonpost.com/joseph-nye/davos-day-3-inter- net -pri_b_39750.html ( Jan. 26, 2007, 18:14 EST). 137. Posting of Dan Meredith & Andy Golding to The Google News Blog, Perspectives About the News from People in the News, http://googlenewsblog.blogspot.com/2007/ 08/perspectives-about-news-from-people-in.html (Aug. 7, 2007, 22:32). 138. ReputationDefender, http://www.reputationdefender.com (last visited June 1, 2007). ReputationDefender was started by a former student of mine, and I once served on its advisory board. The firm has itself been the subject of some controversy. See, e.g., Post- ing of Ann Bartow to Feminist Law Professors, Well, Those “ReputationDefender” Guys Certainly Are Well Connected, Anyway, http://feministlawprofs.law.sc.edu/?pϭ1671 (Apr. 8, 2007, 17:47). 139. Emily Nussbaum, Say Everything, N.Y. M., Feb. 12, 2007, available at http://nymag .com/news/features/27341/index1.html. 140. People aged fifty to sixty-four are almost twice as likely as young people to worry about privacy online. P R C. P P, O N- M M-B, L W-O: T I N A- G O 24 (1999) available at http://people-press.org/reports/pdf/ 72.pdf. 141. Memorandum from Amanda Lenhart & Mary Madden, Research Fellows, Pew Inter- net & Am. Life Project, on Social Networking Websites and Teens: An Overview 2–5 (Jan. 7, 2007), available at http://www.pewinternet.org/pdfs/PIP_SNS_Data_Memo _Jan_2007.pdf; see also A L M M, T, P O- S N, at v (Apr. 18, 2007), available at http://www.pewinternet .org/pdfs/PIP_Teens _Privacy_SNS_Report_Final.pdf (noting that 53 percent of par- ents of online teens have installed filtering software on home computers). 142. A L M M, T C C C, at i–iii, 4 ‒ 5 (2005), available at http://www.pewinternet.org/pdfs/PIP_Teens_Content _Creation.pdf. 143. Justin Berton, The Age of Privacy; Gen Y Not Shy Sharing Online—But Worries About Spying, S.F. C., May 20, 2006, at A1. 144. L M, T, P, O S N, supra note 141, at v (finding that “40% of teens with profiles online think that it would be hard for someone to find out who they are from their profile, but that they could eventually be found online.”). 145. 15 U.S.C. §§ 6502– 6506 (2000). 146. The FTC provides updates on COPPA enforcement on its Web page. The agency has filed twelve cases since COPPA was enacted, and only one in the past three years. See FTC, Privacy Initiatives, http://www.ftc.gov/privacy/privacyinitiatives/childrens_enf .html (last visited June 1, 2007). According to one source, 77 percent of children aged eight to seventeen who were surveyed said they would lie about their age in order to do
Notes to Pages 232 –34 325 something they were restricted from doing on a Web site. Isabel Walcott, Online Pri- vacy and Safety Survey, available at http://web.archive.org/web/20001202110700/ http://www .smartgirl.com/press/privacyfindings.html (last visited June 1, 2007). 147. The U.S. Children’s Online Protection Act and its predecessors also struggled with how to protect kids from receiving information that could be harmful to them, such as pornography, that adults have a right to see. The most restrictive approach has been to ask providers of information online to assume that kids are receiving it unless each person accessing can demonstrate possession of a valid credit card. See 47 U.S.C. § 231(c)(1) (2000). This approach was struck down as unconstitutional. ACLU v. Ashcroft, 322 F.3d 240 (3d Cir. 2003), aff’d and remanded, 542 U.S. 656 (2004). 148. Children’s Internet Protection Act (CIPA), Pub. L. No. 106-554, §§ 1701–1741, 114 Stat. 2763, 2763A-335 to 2763A-352 (2000) (codified as amended at 20 U.S.C. § 9134 and 47 U.S.C. § 254). While one federal court held that the CIPA is unconstitu- tional, see Am. Library Ass’n, Inc. v. United States, 201 F. Supp. 2d 401 (E.D. Pa. 2002), the Supreme Court subsequently reversed that decision and affirmed the Act’s constitutionality. United States v. Am. Library Ass’n, Inc., 539 U.S. 194 (2003). 149. See, e.g., Vodafone, Content Control: Restricted Access, http://www.vodafone-i .co.uk/contentcontrol/restrictedaccess.htm (last visited June 1, 2007); Vodafone, Content Control, http://online.vodafone.co.uk/dispatch/Portal/appmanager/voda fone / wrp?_nfpbϭtrue&_pageLabelϭtemplate11&pageIDϭPAV_0024&redirect edByRedirectsImplServletFlagϭtrue (last visited June 1, 2007) (providing an overview of the content control service). 150. Posting to Furd Log, Lessig and Zittrain—Pornography and Jurisdiction, http://msl1 .mit.edu/furdlog/?pϭ332 ( June 30, 2003, 19:09:54 EST). 151. Alexa, Traffic Rankings for Myspace.com, http://www.alexa.com/data/details/ traffic_details?qϭ&urlϭmyspace.com/ (last visited June 1, 2007). 152. See MySpace.com, How Do I Add Color, Graphics, & Sound to My Profile Page?, http: / / www.myspace.com / Modules / Help / Pages / HelpCenter.aspx?Category ϭ4&Questionϭ7 (last visited June 1, 2007); David F. Carr, Inside MySpace.com, B- M., Jan. 16, 2007, http://www.baselinemag.com/print_article2/0,1217, aϭ198614,00.asp (discussing the history of MySpace.com and its customizability). 153. See Margaret J. Radin, Property and Personhood, 34 S. L. R. 957, 959–60 (1982) (“Most people possess objects they feel are almost part of them. These objects are closely bound up with personhood because of the way we constitute ourselves as con- tinuing personal entities in the world. They may be different as people are different, but some common examples might be a wedding ring, a portrait, an heirloom, or a house. . . . The opposite of holding an object that has become part of one-self is hold- ing an object that is perfectly replaceable with other goods of equal market value. One holds such an object for purely instrumental reasons.”). 154. A C. S’ H, E. W, supra note 1, at § II. 155. PledgeBank, for example, encourages people to take action by exchanging commit- ments to undertake an activity. PledgeBank, http://www.pledgebank.com/ (last visited June 1, 2007). Meetup helps people find and arrange events with others who share common interests. See Meetup, http://www.meetup.com/ (last visited June 1, 2007).
326 Notes to Pages 234–37 156. See Alison Doyle, To Blog or Not to Blog?, A., http://jobsearch.about.com/ od/jobsearch blogs/a/jobsearchblog.htm (last visited June 1, 2007); Ellen Goodman, Editorial, The Perils of Cyberbaggage, T, Feb. 21, 2007, http://www.truthdig .com/report/item/20070221_the_perils_of_cyberbaggage/; Ellen Goodman, Edito- rial, Bloggers Get Caught Between the Real and the Cyber, P P-G, Feb. 23, 2007, at B7; MySpace Is Public Space When It Comes to Job Search: Entry Level Job Seekers—It’s Time to Reconsider the Web, CG., July 26, 2006, http://www.collegegrad.com/press/myspace.shtml. 157. John Perry Barlow, A Declaration of the Independence of Cyberspace (Feb. 8, 1996), http://homes.eff.org/~barlow/Declaration-Final.html. CONCLUSION 1. The XO organization reports that the United Nations Development Programme will partner with them to assist governments in distribution and support of the machines as they are made available. See United Nations Development Programme, $100 Laptop Project Moves Closer to Narrowing Digital Divide ( Jan. 28, 2006), http://content .undp.org / go / newsroom / january-2006 / 100-dollar-laptop-20060128.en?category IDϭ349425&langϭen; OLPC, One Laptop per Child http://wiki.laptop.org/go/ One_Laptop_per_Child. 2. See One Laptop Per Child (OLPC), Progress, http://www.laptop.org/en/vision/ progress/index.shtml; Tim Bloomberg, Quanta to start “One Laptop” Project in Sept., T C P, May 16, 2007, available at http://www.chinapost.com.tw/news/ archives/business/2007516/109813.htm. The post-launch phase is planned to include Mexico, all of Central America, Ethiopia, Angola, Pakistan, Vietnam, Indonesia, and the Philippines. OLPC, Map, http://www .laptop.org/map.en_US.html. 3. See Assoc. Press, Laptop Detractors Shrugged Off, W N, Apr. 4, 2006, http:// www.wired.com/news/technology/0,70584-0.html?twϭrss.index. 4. See Constructionism, http://wiki.laptop.org/go/Constructivism. See generally Seymour Papert & Idit Harel, Situating Constructionism, in C (1991); S- P, M: C, C, P I (1980). It should be noted that constructivism and constructionism are two distinct con- cepts—the first was conceived by Jean Piaget and is based on children’s interests and perceptions. The second was conceived by Seymour Papert and has more to do with how children learn. Both concepts are important for experience-based learning, and OLPC itself invokes both ideas. 5. See Posting of Evan Blass to Engadget, Microsoft Will Sell $3 Software to Developing Countries, http://www.engadget.com/2007/04/20/microsoft-will-sell-3-software-to- developing-countries/ (Apr. 20, 2007, 11:40), Michael Kannellos, Five Countries to Get Cheap Windows XP, CN N., Aug. 10, 2004, http://news.com.com/ FiveϩcountriesϩtoϩgetϩcheapϩWindowsϩXP/2100-1016_3-5304023.html. 6. OLPC posted a request for content in October 2006. See OLPC Request for Content, OLPC Wiki, http://wiki.laptop.org/index.php?titleϭRequest_for_content&oldidϭ 13244 (as of Oct. 3, 2006, 19:14 GMT).
Notes to Pages 237 –44 327 7. See, e.g., Posting of Wayne Hodgins to Off Course-On Target, Opportunities in Our Laps? http://waynehodgins.typepad.com/ontarget/science/ (Apr. 19, 2007, 01:14); Posting of Atanu Dey to Deeshaa, OLPC—Rest in Peace—Part 2, http://www.deeshaa .org/2006/08/04/olpc-rest-in-peace-part-2/ (Aug. 4, 2006). 8. Ryan Singel, High Security for $100 Laptop, W, Feb. 7, 2007, http://www.wired .com/news/technology/0,72669-0.html. 9. OLPC Bitfrost, http://wiki.laptop.org/go/OLPC_Bitfrost (as of Feb. 1, 2007) (“The Bitfrost platform governs system security on the XO laptops. Given that ‘objectionable content’ lacks any kind of technical definition, and is instead a purely social construct, filtering such content lies wholly outside of the scope of the security platform and this document.”); OLPC Code Browser, http://dev.laptop.org/git.do?pϭsecurity ;aϭcommit ;hϭHEAD. 10. OLPC Bitfrost, http://wiki.laptop.org/go/OLPC_Bitfrost (as of Feb. 1, 2007) (“The OLPC project has received very strong requests from certain countries considering join- ing the program to provide a powerful anti-theft service that would act as a theft deter- rent against most thieves . . . the anti-theft daemon will shut down and lock the machine if its cryptographic lease ever expires. In other words, if the country operates with 21-day leases, a normal, non-stolen laptop will get the lease extended by 21 days each day it con- nects to the Internet. But if the machine does not connect to the Internet for 21 days, it will shut down and lock.”). 11. See Caslon Analytics, http://www.caslon.com.au/volkscomputernote1.htm#morphy (last visited May 22, 2007). 12. Bruce Sterling, The Year in Ideas: A to Z; Simputer, N.Y. T, Dec. 9, 2001, §6, avail- able at http://www.nytimes.com/2001/12/09/magazine/09SIMPUTER.html?exϭ 1171429200&enϭ9383e00b97332584&eiϭ5070. 13. See Jason Overdorf, The $100 Un-PC, N., Feb. 12, 2007, http:// www.newsweek.com/id/42955; Nitya Varadarajan, Cheap, Cheaper, Cheapest, B- T, Mar. 26, 2006, available at www.india-today.com/btoday/20060326/fea- tures3html. Reports of a $10 PC in the idea phase have also been released recently. Ak- shaya Mukul, HRD Hopes to Make $10 Laptops a Reality, T T I, May 4, 2007, available at http://times ofindia.indiatimes.com/Business/HRD_hopes_to_make _10_laptops_a_reality/article show/1999828.cms. 14. Guerrilla Warfare and the OLPC, OLPC Wiki, http://wiki.laptop.org/go/Guerrilla _Warfare_and_the_OLPC (as of May 22, 2007, 01:34 GMT). 15. Gene Spafford, Re: [IP] $10 Laptops from HRD Ministry, India, IP Listserv (May 6, 2007), http://www.listbox.com/member/archive/247/2007/05/sort/time_rev/page/ 2/entry/23:91/20070506140410:307417BE-FBFC-11DB-A2B9-C8C92BEBA671/. 16. RFC Editor et al., RFC 2555: 30 Years of RFCs (1999), http://www.ietf.org/rfc/ rfc2555.txt. 17. See, e.g., Tools, Technology & Solutions, http://www.plagiarism.org. 18. Middlebury College’s History Department banned the use of Wikipedia as a source in early 2007. See A Stand Against Wikipedia, I H E., Jan. 26, 2007, http:// insidehighered.com/news/2007/01/26/wiki; Noam Cohen, A History Department Bans Citing Wikipedia as a Research Source, N.Y. T, Feb. 21, 2007, at B8, available at
328 Notes to Pages 244–46 http://www.nytimes.com/2007/02/21/education/21wikipedia.html. Other schools are frowning upon Wikipedia as a source as well. Matt Reilly, Source of the Problem, T D O, Apr. 2, 2007, available at http://www.dailyorange.com/home/index .cfm?eventϭdisplayArticle&ustory_idϭfe593637-958b-44e6-9f03-b8cba4264ec6. 19. SAGrader, IdeaWorks, http://www.ideaworks.com/sagrader/index.html (last visited May 22, 2007). 20. InnoCentive Frequently Asked Questions, http://www.innocentive.com/faqs.php (last visited Sept. 30, 2007); Darren J. Carroll, Chief Executive Officer, InnoCentive, Distrib- uted R&D Case Study: Innocentive (Mar. 3, 2005), http://ocw.mit.edu/NR/rdonlyres / Sloan-School-of-Management / 15-352Spring-2005 / 2F3996A5-1852-419E-8EB8- 6C4354266BA2/0/mit_mar07_2005.pdf. 21. InnoCentive Frequently Asked Questions, http://www.innocentive.com/faqs.php (last visited Sept. 30, 2007) (“If your solution is selected as ‘best’ by the Seeker, prior to re- ceiving a financial award you must transfer your intellectual property rights in the solu- tion.”). 22. Amazon’s Mechanical Turk, http://www.mturk.com/mturk/welcome (last visited Sept. 30, 2007); see also Posting of Elinor Mills to Tech News Blog, Amazon’s Mechanical Turk Lets You Make $$$, Sort Of, http://www.news.com/8301-10784_3-9782813-7.html (Sept. 21, 2007, 12:35 PDT).
Index accessibility, 29, 72–73, 77, 93, 131, features to, 23, 106–7; control exer- 188, 232 cised by, 3, 7, 57, 81, 82; and dumb terminals, 101–2; and hyperlinks, 89; accountability, 32, 162– 63 and PlayMedia, 104; walled gardens of, acoustic separation, 122 29, 89, 254n7 adaptability, 71–72, 93, 125 Apache Web server, 192 Adler, Michael, 110 APIs (application programming inter- advertising industry, 56 faces), 124, 184–85, 215 affordance theory, 78 Apple Computers: Apple II personal amateur innovation, 26, 27 computers, 1–2, 3; business model of, Amazon.com, 214; differential pricing by, 17; Dashboard, 272n55; data gather- ing by, 160; iPhone, 1, 2–3, 5, 101, 204–5; Mechanical Turk, 246; “mouse 106, 182; iPod, 1, 101, 233; iTunes, droppings,” 217, 219; and user ratings, 105, 121, 197; VisiCalc, 2; word pro- 146, 147, 151, 215 cessing software of, 17 AMD, Telmex Internet Box, 59 appliance model, 17 Anderson, Chris, 85 appliances: consumer information tech- Anderson County, Tennessee, jailcams in, nology in, 13; contingent, 107; in- 209 –10 tended for individual use, 18; owner- anonymity, 33 ship of, 106; regulability of, 107, 125; Answers.com, 145 remote updates of, 106–7; security antiabortion activism, 215 AOL (America Online), 174; adding new 329
330 Index appliances (continued ) Bessen, James, 190 worries with, 106 –7, 123 –24, 150; Bidder’s Edge, 224, 225 smarter, 107; tethered, 3, 4, 5, 8 – 9, biometric readers, 228 59, 101– 3, 106, 107. See also informa- BitTorrent, 90, 121, 287n113 tion appliances BlackBerries, 57, 101, 118, 176 Black Hat Europe hacker convention application layer, 67– 69 application programming interface (API), (2006), 56 – 57 blogs: from automated robots, 207–8; 124, 184 – 85, 215 application space, 17 captcha boxes of, 207–8; censorship architecture, as law, 108 of, 113; Libertarian model in, 131; ARPANET, 256 – 57n32 power of, 88, 95; spread of, 148, 151; Association for Computing Machinery, of teens, 231 Blossom, 195 –96 38 Bomis search engine, 133, 289n19 AT&T: centralized control structure bookmarks, 58 books.google.com (Web site), 224–25, of, 40; competition of, 24; connect 242 charges of, 23; and iPhone, 2, 182; Bork, Robert, 202 long-distance network of, 40; and Bostic, Keith, 38 modems, 22–23, 25 –26; as monopoly, Boston College, data loss by, 204 21, 81, 182; and online services, 23 – botnets, 45 – 47 25; and outside innovations, 21–22, Boyle, James, 113 82, 89, 121, 182; regulation of, 21, 81, Bricklin, Dan, 2 183, 221; telephone network con- Brin, David, 209 trolled by, 21–24; and third-party broadband: PC accessibility via, 4; remote hardware, 81; tone frequency of, 40 updates of, 53; tragedies of the com- ATMs (automated teller machines), 20 mons in, 158 automatons, creation of, 211 Brother, “smart” typewriters, 19, 20, 34 Avvo, 320n97 browsers, development of, 29 Azureus, 121 Burning Man festival, 34 business, “long tail” of, 214 bait and switch, 183, 184 “Bus Uncle” of Hong Kong, 211 Bank of America, 203 – 4 bank vaults, 32 cable television, 181–82, 183 Barlow, John Perry, 161 Camp, Jean, 160 BBC (British Broadcasting Corporation), Cap’n Crunch whistle, 40, 42 captcha boxes, 207–8, 227 121 cars. See motor vehicles BBS (bulletin board system) software, Carter, Tom, 22 Carterfone, 22, 25, 26, 81, 121, 182 25 – 26 CB simulator, 23 Beesley, Angela, 143 censorship, 105, 113–17; amplification Benkler, Yochai, 91– 92, 93, 98, 99, 146, of, 114 –17; circumventing, 180; by 160, 192, 193, 206, 207, 228 commercial filtering programs, 114– Benner, Mary, 24 Berkman Center. See Harvard University, Berkman Center Berners-Lee, Tim, 95
Index 331 15; and endpoint control, 125; Mill collaboration, online, 95–96 on, 98 – 99, 100; post hoc scrubs, 116; commercial filtering programs, 114–15 retroactive, 109 common law, 110 CERT/CC (Computer Emergency Re- commons, 78 –79, 90 sponse Team Coordination Center), Communications Decency Act, 195 39, 147– 48 communitarianism, 293n71 chaos, in absence of law, 128 CompuServe, 23, 24, 27; central control Chapman v. United States, 188 Chickasaw, Alabama, ownership of, 172 by, 3, 7, 57, 74, 81, 82, 106–7; data child abuse, online images of, 111 paths of, 40 – 41; and Digital Millen- children: Children’s Internet Protection nium Copyright Act, 119; and dumb Act (CIPA), 325n148; Children’s On- terminals, 41, 101–2; “Electronic line Privacy Protection Act of 1998 Mall” of, 29 – 30; era at an end, 34, (COPPA), 232; One Laptop Per 174, 255n7, 256n24; and hyperlinks, Child, 235 – 41, 244; restricted online 89; measurement in, 157 use by, 232– 33 computers: customized to user’s needs, China: Google in, 113, 147; information 17, 30; “dumb” terminals, 15, 20, 41, regulation in, 105, 108, 114, 147, 180, 101–2; hardware and software bun- 196; surveillance in, 113; Wikipedia dled in, 9; mainframes, 12, 15, 24, 57; in, 144 minicomputers, 15; professional man- Christensen, Clayton, The Innovator’s agement of, 17, 44; rogue applications Dilemma, 83 – 84, 86 for, 24; unbundling of, 12, 14; vendor Christian Gallery News Service, 215 programming, 8–9, 17 chuckroast.com, 170 –71 conduct rules, 122–23 Citizendium, 145 Constitution, U.S.: and anonymous citizen reporters, 216 speech, 213; and free speech, 114, 230; Clark, David, 31, 156 and gun control, 117; and privacy poli- Clarke, Richard, 51 cies, 112, 185–86, 188; and private clickworkers, 206 property, 172 code: abstract concepts in, 190; and copy- constructionism (constructivism), 236– right infringement, 189 –92; corrup- 37 tion of, 4, 43, 44; and cyberlaw, 104 – consumer protection law, 177 8, 197, 310n92; data paths separate content layer, 67 from, 40 – 41; easy to write, 19; em- contextualization, 229–31 bedded into hardware, 13; good and coordinate coexistence producing infor- useful, 31; outside, 4, 16 –17, 56; poi- mation, 207 soned, 189; proprietary, 192; renegade, COPPA (Children’s Online Privacy Pro- 36–38; sharing of, 16; transmission of, tection Act of 1998), 232 14; view source, 121; “west coast,” copyright infringement, 111, 119–20, 105. See also worms and viruses 175; and code production, 189–92; code-backed norms, 223 –28 and content thickets, 192–93; and code-based enforcement mechanisms, Creative Commons licenses, 225; and 105 “creative cultural bricolage,” 192; and code thickets, 188 – 92 employment agreements, 189; patent thicket, 190 –92; and peer-leveraging
332 Index copyright infringement (continued ) ated uses, 119–22, 190–91; tradi- technologies, 216; penalties for, tional frameworks of, 242; and un- 286n99; and robot scanning, 224 –25; wanted robot access, 224–25 statute of limitations on, 191; Wiki- cyberspace, map of, 166 pedia policy on, 143, 168, 189, 195 Cyworld, 218 copyright law, 79, 111, 112, 197; and Dagon, Dave, 46 Digital Millennium Copyright Act, Dan-Cohen, Meir, 122 119–20; fair use defense in, 115; and darknets, 197 free software, 189; online, 123 –26; databases, 88; centralized, 208; govern- and prior restraints, 115–16; and tol- erated uses, 119 –22 ment, 202; and privacy law, 202; rela- tional, 15; search, 224; of worms and Cornell University, 39 viruses, 53 couchsurfing.com, 243, 301n7 data gathering, 160 Craigslist, 85 data genealogy, 225–28 Creative Commons, 79, 193, 225, 226, data mining, 204–5 data portability, 176–78 227 data repositories, 186–88 Cuff, Dana, 210 decision rules, 122–23 Cunningham, Ward, 95, 96, 133, 151 Defense Department, U.S., 38 Currah, Andrew, 83 democracy, semiotic, 146 CVS (concurrent versions system), 94 differential pricing, 204–5 cyberlaw: acoustic separation in, 122; am- Digital Millennium Copyright Act of 1998 (DMCA), 119–20, 224 plification of, 114 –17; code as, 104 – digital rights management (DRM) sys- 8, 197, 310n92; conduct rules, 122– tems, 105 23; consumer protection, 177; and digital video recorders (DVRs), 57, 103– contraband rules, 103 – 4; and data 4, 109, 121 portability, 177; decision rules, 122– domain names, 96, 171, 239 23; and due process, 172–74; and end- DVD players, copy protection in, 108, to-end neutrality, 164 – 65; ex ante leg- 123 islative-style drafting of, 109; flexibility of, 107; illegal online file sharing, 111– eBay, 85, 148, 151; vs. Bidder’s Edge, 12; impoundment remedies in, 104; 224, 225; and identity tokens, 228; and individual liability, 193 – 95; infor- reputation system on, 217–18 mation aggregators protected in, 138; limitations of, 168; and lockdown, e-books, 109 102, 177; notice-and-takedown regime EchoStar, 103 –4, 107, 108, 121 in, 119 –20; objections to, 111–12; educators, fear as response of, 244 perfect enforcement of, 107–10, 112, electricity, adaptability of, 72 122, 134, 166; and preemption, 108; Electronic Frontier Foundation, 161 and prior restraints, 115, 122; and re- e-mail: government surveillance of, 118, sponsibility, 162– 64; rule and sanction approach to, 129; rules vs. standards 187; as necessity, 137; and sender au- in, 128; as self-enforcing, 107; sources thentication, 193–94; third-party stor- of, 128; specific injunction, 108 – 9; age of, 185 – 88. See also spam and surveillance, 109 –10; and toler-
Index 333 EMI (music company), 121 Freedom of Access to Clinic Entrances Encarta Web site, 146, 160 Act, 215 encryption, 208 Encyclopaedia Britannica, 131, 137, 198, Freeman, Jody, 224 Free Software Foundation, 131, 189 226 free software philosophy, 77, 94, 131, endpoint: control over, 125 –26; discon- 189, 190, 191–92 nectedness of, 33, 41; end-to-end the- Friden Flexowriter, 12–13, 174 ory, 31, 164 – 67, 250n2; generative, Friedman, Allan, 160 105; importance of, 8, 18, 180; lock- Funcade, 54 down of, 106, 155; non-generative, 106, 164; potential compromise of, games, 15, 47, 57, 88 41–42, 167– 68; regulation applied gated communities, 165 to, 8, 105 – 6; security worries about, gatekeepers, 81, 93, 174, 286n101, 106–7, 164, 166; varying levels of ac- cessibility, 30 318n84 envelope information, 187 Gates, Bill, 3, 16, 184, 205 epinions.com, 146 Gawker Stalker, 214 “ESP” game, 207 generative systems: absence of measure- Facebook, 184, 226 ment in, 157–59; future strategies for, facial recognition technology, 214 –15 175 – 99; legal responsibility in, 163– fair use defense, 115, 121–22 64; maintaining, 126, 173; maintain- FBI, 110, 113, 118, 187 ing regulators’ tolerance of, 193–99; FCC (Federal Communications Com- non-generative vs., 188–92; and pro- crastination principle, 152, 164, 180, mission): and AT&T, 21, 26; Fairness 242, 245; security in, 166; stability of, Doctrine, 323n135 153 –74; use of term, 74; as what we Federalist Papers, 317n67 make them, 242, 244–46; as works in FIDOnet, 25 –26, 27, 29, 237 progress, 152 Fifth Amendment, 112 generative technology: accessibility of, file sharing, illegal, 111–12, 197 72–73, 93; and accountability, 162– filtering systems, 46, 111, 114 –15 63; adaptability of, 71–72, 93, 125; FIND initiative. See National Science affordance theory, 78; Apple II, 2; ben- Foundation, FIND initiative of efits of, 64, 79–80, 84–85; blending Firefox, 54, 184 of models for innovation, 86–90; con- firewalls, 59 trol vs. anarchy in, 98, 150, 157–62; First Amendment, 114, 172, 230 design features of, 43; ease of mastery, Fisher, William, 92 72; end-to-end neutrality of, 165; ex- Fiske, John, 92 pansion of, 34; features of, 71–73; Flickr, 123, 214, 226 freedom vs. security in, 3–5, 40–43, floppies, virus spread by, 44 151; free software philosophy, 77; and FON, 180, 194 – 95 generative content, 245; group creativ- Foreign Intelligence Surveillance Act ity, 94, 95; hourglass architecture, 67– (FISA), 187 71, 99; innovation as output of, 80– Fourth Amendment, 112, 188 84, 90; input/participation in, 90–94; leverage in, 71, 92–93; non-generative
334 Index generative technology (continued ) Griffith, Virgil, and Wikiscanner, 151 compared to, 73 –76; openness of, 19, Gulf Shipbuilding Corporation, 172 150, 156 – 57, 178; pattern of, 64, 67, gun control legislation, 117 96–100; as platform, 2, 3; recursive, 95–96; success of, 42– 43; theories of hackers: ethos of, 43, 45, 53; increasing the commons, 78 –79; transferability skills of, 245 of, 73; vulnerability of, 37– 51, 54 – 57, 60 – 61, 64 – 65 Harvard University, Berkman Center, 159, 170 generative tools, 74 –76 generativity: extra-legal solutions for, HD-DVDs, 123 Health, Education, and Welfare (HEW) 168–73; Libertarian model of, 131; and network neutrality, 178 – 81; para- Department, U.S., privacy report of dox of, 99; recursive, 94; reducing, and (1973), 201– 5, 222, 233–34 increasing security, 97, 102, 165, 167, Herdict, 160, 163, 167–68, 173, 241 245; repurposing via, 212; use of term, Hippel, Eric von, 86–87, 98, 146 70; and Web 2.0, 123 –26 Hollerith, Herman, 11–12, 13; business Geocities.com, 119, 189 model of, 17, 20, 24 GNE, 132– 33, 134, 135 Hollerith Tabulating Machine Company, GNU/Linux, 64, 77, 89, 114, 190, 192 11–12 GNUpedia, 132 home boxes, 180–81 goldfish bowl cams, 158 honor codes, 128–29 “good neighbors” system, 160 Horsley, Neal, 215 Google: and advertising, 56; book scan- Hotmail, 169 ning project of, 224 –25, 242; Chinese “How’s My Driving” programs, 219, 229 censorship of, 113, 147; clarification HTML (hypertext markup language), 95 available on, 230; data gathering by, Hunt, Robert, 190 160, 221; death penalty of, 218, 220; Hush-A-Phone, 21–22, 81, 82, 121 image search on, 214 –15; innovation hyperlinks, 56, 89 in, 84; map service of, 124, 184, 185; hypertext, coining of term, 226 privacy policy on, 306n47; and pro- crastination principle, 242; as search IBM (International Business Machines): engine, 223, 226; and security, 52, antitrust suit against, 12; business 171; and spam, 170 –73 model of, 12, 23, 30, 161; competitors Google Desktop, 185 of, 12–13; and generative technology, Google News, 242 64; Internet Security Systems, 47–48; Google Pagerank, 160 mainframe computers, 12, 57; OS/2, Google Video, 124 88; and risk aversion, 17, 57; System governments: abuse of power by, 117–19, 360, 174 187; oppressive, monitoring by, 33; PCs investigated by, 186 – 88; research identity tokens, unsheddable, 228 funding from, 27, 28 image recognition, 215–16 GPS (Global Positioning Systems), 109, immigration, illegal, 209 214 information appliances: accessibility of, graffiti, 45 29, 232; code thickets, 188–92; con- tent thickets, 192–93; and data porta- bility, 176 –78; generative systems
Index 335 compared to, 73 –76; limitations of, 41, 130, 243; economic value as a 177; and network neutrality, 178 – 85; commons, 79, 85; entrance of, 26–30; PCs as, 4, 59 – 61, 102, 185 – 88; PCs expansion and growth of, 43, 102; first vs., 18, 29, 57– 59; and perfect en- message on, 27; flexibility vs. security forcement, 161; and privacy, 185 – 88; of, 9, 40, 42–43; generative technol- regulatory interventions in, 103 –7, ogy of, 3, 5, 8, 34, 72, 152, 178, 242; 125, 197; remote control of, 161; re- goodwill subsidy assumed, 9; hourglass mote updates of, 106 –7, 176; security architecture of, 67–69; and market dilemma of, 42, 106 –7, 123 –24, 150, forces, 20 –21; modularity of, 41; mo- 176– 88; specific injunction, 108 – 9; tives of creators, 28; numbers of users, variety of designs for, 20; Web 2.0 and, 36, 157– 58; outside code on, 4; per- 102; See also specific information appli- sonal identity management on, 32–33; ances physical layer of, 67–69; Postel’s Law, information overload, 230 134; protocol compatibility in, 28–29; information services, early forms, 9 protocol layer of, 39, 67–69; and qual- InnoCentive, 246 ity of service, 33; quiet development innovation: blending models for, 86 – 90; of, 7– 8, 243; regulability of, 8, 9, 103, generativity as parent of, 80 – 84, 90; 105, 107, 196–97; regulatory inter- group, 94; and idiosyncrasy, 90 – 91; ventions of, 20, 98, 103, 245; research inertia vs., 83 – 84; “sustaining” vs. environment as source of, 34, 38–39; “disruptive,” 83 – 84, 87, 97 RFCs for, 243; security problems of, intellectual property: and code thickets, 97, 130, 168, 195; shared access to, 32; 188– 92; and contraband rules, 103 – simplicity as core value of, 31–32, 33; 4; cross-licensing of, 190; fair use de- social layer of, 67; standards of, 39, fense, 115, 121–22; illegal online file 224, 225; as terrorist recruiting tool, sharing, 111–12, 197; inadequate pro- 198; and tethered appliances, 8–9; tection for, 217; licensing of, 79; and transmission speed of, 32, 33; trusted patent thicket, 190 – 92; principle of systems in, 105; unexpected success of, tolerated uses, 119 –22, 190 – 91; and 7, 20, 33, 34; untenable status quo of, privacy law, 210; statutes of limita- 43 – 51; users as consumers vs. partici- tions, 191; value of, 98. See also cyber- pants, 161; as what we make it, 242, law 244 – 46; wireless access points of, 69, Interface Message Processors (IMPs), 27 179 – 80, 194; worms and viruses in, Internet: application layer, 67– 69; as- 36 – 54 sumption of equality in, 33 – 34; as- Internet Engineering Task Force (IETF), sumptions of user trustworthiness, 20 – 39, 141, 148; RFC 1135 on Morris 21, 30– 32, 130, 227; as “best efforts” worm, 60, 151 network, 33; browsers, 121; bundled Internet Governance Forum, 242–43 proprietary model defeated by, 30; iPhone, 1, 2– 3, 5, 101, 106, 182 channels of communication and con- iPod, 1, 101, 233 trol in, 42; collaboration in design of, Iran, censorship in, 114–15 34; competitors, 9; connectivity of, 32; ISPs (Internet Service Providers): and consumer applications of, 28; content Digital Millennium Copyright Act, layer of, 67; design of, 27–28, 30 – 35, 119 –20; early on-ramps to, 29, 30;
336 Index ISPs (Internet Service Providers) law of promissory estoppel, 183–84 (continued ) Lego building blocks, 74, 87, 93 and government investigations, 187; Lessig, Lawrence, 104, 105, 108, 146, and home boxes, 181; and legal re- sponsibilities, 163 – 64; as “middle” of 192, 196 – 97, 232 network, 167; and perfect enforce- leverage, 71, 92–93 ment, 166; and quality of service, 33; Lexis/Nexis, 89 and user ID, 195; and wi-fi, 179 – 80, “Libertarian gotcha,” 113–14 194 licensing fees, 176–77 link farms, 207 iTunes, 105, 121, 197 Linksys, 180 Linux, 16, 54, 64, 77, 190, 236 Jackson, Janet, 109 Lovebug, 44 jailcams, 209 –10 Jennings, Tom, 25 –26, 27 Mac OS, 16, 54, 69 Jessica Simpson screensaver, 53 Macrovision, 108 Jobs, Steve, 1, 2– 3, 182 Malware. See worms and viruses mapping, online, 123–24, 185 Kang, Jerry, 210 MAPS (Mail Abuse Prevention System), Kaspersky, Eugene, 47 KaZaA, 53 – 54, 56 168 –70, 172 Kennedy, Robert F., 138 Marsh v. Alabama, 172 King, Rodney, 209, 210 MasterCard International, 204 kiosk mode, 73 McAfee, 159, 171 kludge, 25 –26 MCI Mail, 23 Koster, Martijn, 223 McNealey, Scott, 202, 231 Meehan, Marty, 139 laches, 308 – 9n74 Meetup, 148, 243 law: absence of, 127– 30; antitrust, 184; message boards, 25 Michelangelo virus, 44 common law, 183; criminal, 197; de- microphones in public spaces, 208–9 fense of laches, 191; and easements, Microsoft: in antitrust cases, 17, 252n19; 183; effectiveness of, 196; penalties for being caught vs. benefits of breaking, business model of, 17, 57–58; and 144; and probable cause, 186, 187; Chinese censorship, 113; and com- and quasi-contracts, 184; statutes of pany’s vision, 16, 205; and competi- limitations, 191; telecommunications, tion, 236; data gathering by, 160; En- 221, 304 – 5n28. See also cyberlaw carta Web site, 146, 160; and Internet law enforcement officers: cooperation access, 29; Internet Explorer, 54, 182– with, 118; and privacy law, 202; public 83; licensing by, 58; as monopolist, 16, surveillance of, 209 –10; surveillance 182– 83, 266n105; MSN Spaces, 95; by, 4– 5, 109 –10, 113, 117, 118, OS/2, 88; and patents, 190; profitabil- 209–10, 215 –16; and third-party ity of, 16; Security Response Center, storage, 186 – 88; and “Wanted” 55, 173; Vista, 154–55, 172; word posters, 215 processing software, 17; Xbox 360 law of adverse possession, 183 – 84 video game console, 3–4, 58, 184; Zune music player, 108
Index 337 Microsoft Windows, 3, 4; bundling of, negligence law, 128 with PCs, 57; Internet access of, 29, Negroponte, Nicholas, 235, 236, 237, 85; as open platform, 16, 58, 69, 77, 124; Solitaire, 207; source code of, 77; 239 system restore feature, 154 – 55; as neighborhood watch systems, 158, 161 virus target, 54, 55; Windows 95, 29; Nelson, Theodor, 226, 227 and Winsock, 29 netizenship, 142–48, 161, 196 Netscape, 271n52 Microsoft Word: virus attacks against, 47; networks: anonymity on, 33; applian- and WordPerfect, 176, 184 cized, 3, 8; building, 7, 21–23; cheap, Mill, John Stuart, 90, 93, 94, 98, 100 205 – 6, 210, 214, 216, 221; code miniaturization, 155 – 56 shared via, 16; company-run, 24; of mobile phones: and competition, 59; as “dumb” terminals, 15; grassroots, 25– 26; Internet as network of, 33; Internet information appliances, 57, 58, 82– as replacement of, 26–30; modularity 83, 101, 232; and lock-in, 177; and of design, 31; neutrality of, 178–85; network neutrality, 181–82; remote not connected, 24; personal identity reprogramming of, 110, 176; surveil- management on, 32; procrastination lance via, 4, 110, 117, 210 –14 principle in, 31, 33, 99, 164; profes- modems, 22–23, 25 –26, 121 sional management of, 44; proprietary, modularity, 31 7, 8, 23 –25, 31, 41, 42, 81, 82, 85, Monderman, Hans, 127–28 189; security dilemma of, 42, 216–21; Moore’s Law, 205 trust-your-neighbor approach to, 31– Moore v. Regents of the University of Cali- 32; of word processors, 20 fornia, 227 Neven Vision, 214–15 Morris, Robert Tappan, Jr., 37– 38, 39 New York City Police Department, 215– Morris worm, 36 – 43, 44, 45, 52, 53, 60, 16 151 Nintendo Wii, 303–4n22 Mosaic (software), 88 Nixon, Richard M., 201–2 motor vehicles: mobile phones in, 4; On- Novantium Nova, 239 Star, 109, 110, 113, 117, 118, 187 NSF (National Science Foundation), 28, mouse droppings, 217, 219 38 multi-stakeholder regimes, 242– 43 Nupedia, 133, 134, 145 music industry, file sharing in, 194 Nye, Joseph, 230 mutual self-interest, 128 Mydoom, 44 objectivism, 143 MySpace, 124, 231, 233 Ohm, Paul, 51 MythTV, 59 OhmyNews, 216, 228 MyWikiBiz, 140 Oink, 197, 198 One Laptop Per Child (XO), 235–41, NASA (National Aeronautics and Space Administration), 206 244 online map services, 123–24 National Research Network, 38 – 39 OnStar, 109, 110, 113, 117, 118, 187 National Science Foundation, FIND ini- open proxy, 46 operating systems, 17 tiative of, 174 national security letters, 187
338 Index ORBS (Open Relay Behavior Modifica- virtual, 156; zombies, 46, 52, 54, 57, tion System), 169 166 personal identity management, 32–33 Owad, Tom, 215 Pew Internet & American Life Project, 51 Oxford Internet Institute, 159, 170 phishing, 47, 53, 99 photo recognition, 214–15 Papert, Seymour, 236 physical layer, 67–69 parental filters, 111 placeholders, 56 passwords, 32, 37, 42 plagiarism, 244 patent infringement, 190 – 92 plastic, adaptability of, 72 PATRIOT Act. See September 11 attacks PlayMedia, 104, 108 Pledgebank, 148, 243 and PATRIOT Act pornography, child, 111 PDAs (personal digital assistants), 58 – 59 Posner, Eric, 213 peer production, 206 –16 Post, David, 123 perfect enforcement, 107–10, 112, 122, Postel’s Law, 134 post hoc remedies, 122 134, 161, 166 post hoc scrubs, 116 personal computers (PCs): accessibility Postman, Neil, 93 preemption, 108 via broadband, 4; business adoption of, press conference behavior, 212–13, 229 15–16; connected by modems, 25; prime time, being ready for (and the gen- connectivity vs. design of, 166; data erative Net), 153–54 sharing on, 160; desktop, 17; develop- prior restraints, 115, 122 ment of, 15; as electronic workbooks, Privacy Act (1974), 202 236; as endpoints, 167; flexible archi- privacy: administrative burdens of, 221– tecture of, 16; generative technology 22; and captchas, 208; and cheap sen- of, 2, 3, 5, 19, 34, 72; government in- sors, 206, 208–9, 210, 216, 221; vestigations of, 186 – 88; Green and code-backed norms, 223–28; Consti- Red, 155; of hobbyists, 13, 14, 15, 18, tutional support of, 112, 185–86, 19, 34; hourglass architecture of, 69 – 188; and consumer protection law, 71; increasing reliance on, 102; inde- 177; contextualization, 229–31; data pendent functioning of, 15; as infor- genealogy, 225–28; enforceability of, mation (tethered) appliances, 4, 59 – 112–14; and generation gap, 231–34; 61, 102, 185 – 88; information appli- and government power, 117–19, 186– ances vs., 18, 29, 57– 59; and Internet 88; HEW report (1973) on, 201–5, compatibility, 28 –29; lockdown of, 4, 222, 233 – 34; and industry self-regula- 5, 57, 102, 155 – 56, 164, 165; model tion, 203; involuntary celebrities, of computing, 17; modularization of, 210 –14; “just deal with it,” 111–12; 156; PC revolution, 3, 18; potential and peer production, 206–16; per- functionality sold with, 13; regulabil- sonal information security, 203–4; Pri- ity of, 106; search across computers, vacy 1.0, 201–5, 208, 215, 216, 222, 185; security dilemma of, 241; in 232; Privacy 2.0, 205–34; as proxies sites where users are not owners, 4; and third-party storage, 186 – 88; “trapped,” 77; unsecured on Internet, 45; users as programmers for, 14, 15;
Search
Read the Text Version
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354